P. Beaucamps and E. Filiol, On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007.
DOI : 10.1007/s11416-006-0029-6

URL : https://hal.archives-ouvertes.fr/inria-00338074

G. Bonfante, M. Kaczmarek, and J. Y. Marion, Control Flow Graphs as Malware Signatures, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00176235

D. Bruschi, L. Martignoni, and M. Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006.
DOI : 10.1007/11790754_8

M. Christodorescu and S. Jha, Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004.
DOI : 10.1145/1013886.1007518

M. Christodorescu, S. Jha, J. Kinder, S. Katzenbeisser, and H. Veith, Software transformations to improve malware detection, Journal in Computer Virology, vol.3, issue.1, pp.253-265, 2007.
DOI : 10.1007/s11416-007-0059-8

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.20

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A Semantics-Based Approach to Malware Detection, POPL'07, 2007.

D. Gryaznov, Scanners of the Year 2000: Heuristics Automatic Extraction of Computer Virus Signatures, Proceedings of the 5th International Virus Bulletin 4th Virus Bulletin International Conference, pp.178-184, 1994.

M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001.
DOI : 10.1109/SECPRI.2001.924286

P. Ször, The Art of Computer Virus Research and Defense, 2005.

G. Tesauro, J. Kephart, and G. Sorkin, Neural networks for computer virus recognition . Expert, IEEE [see also IEEE Intelligent Systems and Their Applications, pp.5-6, 1996.

A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia, Normalizing metamorphic malware using term rewriting. scam, pp.75-84, 2006.