On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007. ,
DOI : 10.1007/s11416-006-0029-6
URL : https://hal.archives-ouvertes.fr/inria-00338074
Control Flow Graphs as Malware Signatures, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00176235
Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006. ,
DOI : 10.1007/11790754_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758
Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004. ,
DOI : 10.1145/1013886.1007518
URL : http://cecs.wright.edu/cop/cybw/Christodorescu_Mihai_.pdf
Software transformations to improve malware detection, Journal in Computer Virology, vol.3, issue.1, pp.253-265, 2007. ,
DOI : 10.1007/s11416-007-0059-8
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005. ,
DOI : 10.1109/SP.2005.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399
A Semantics-Based Approach to Malware Detection, POPL'07, 2007. ,
Behavioral detection of malware: from a survey towards an established taxonomy, Journal in Computer Virology, 2008. ,
The Art of Computer Virus Research and Defense, 2005. ,
Normalizing metamorphic malware using term rewriting. scam, pp.75-84, 2006. ,