P. Beaucamps and E. Filiol, On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007.
DOI : 10.1007/s11416-006-0029-6

URL : https://hal.archives-ouvertes.fr/inria-00338074

G. Bonfante, M. Kaczmarek, and J. Y. Marion, Control Flow Graphs as Malware Signatures, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00176235

D. Bruschi, L. Martignoni, and M. Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006.
DOI : 10.1007/11790754_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758

M. Christodorescu and S. Jha, Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004.
DOI : 10.1145/1013886.1007518

URL : http://cecs.wright.edu/cop/cybw/Christodorescu_Mihai_.pdf

M. Christodorescu, S. Jha, J. Kinder, S. Katzenbeisser, and H. Veith, Software transformations to improve malware detection, Journal in Computer Virology, vol.3, issue.1, pp.253-265, 2007.
DOI : 10.1007/s11416-007-0059-8

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A Semantics-Based Approach to Malware Detection, POPL'07, 2007.

H. Debar, E. Filiol, and J. G. , Behavioral detection of malware: from a survey towards an established taxonomy, Journal in Computer Virology, 2008.

P. Ször, The Art of Computer Virus Research and Defense, 2005.

A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia, Normalizing metamorphic malware using term rewriting. scam, pp.75-84, 2006.