Raw assault on a poly/metamorphic engine, EICAR, pp.173-184, 2009. ,
Certified self-modifying code, pp.66-77, 2007. ,
DOI : 10.1145/1273442.1250743
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.367.9843
On the semantics of self-unpacking malware code, 2008. ,
Surfing on code waves, LORIA, Tech. Rep, 2009. ,
Computer implementation and applications of kleene's S-m-n and recursive theorems, Lecture Notes in Mathematics Logic From Computer Science, Y. N. Moschovakis, pp.243-263, 1991. ,
Enumeration operators and the concept of program, 1956. ,
Theory of Recursive Functions and Effective Computability, 1967. ,
On Abstract Computer Virology from a Recursion Theoretic Perspective, Journal in Computer Virology, vol.23, issue.3, pp.3-4, 2006. ,
DOI : 10.1007/s11416-005-0007-4
URL : https://hal.archives-ouvertes.fr/inria-00115199
Partial evaluation of computing process? an approach to a compiler-compiler, Systems, Computers, Controls, pp.45-50, 1971. ,