A. Issa, Raw assault on a poly/metamorphic engine, EICAR, pp.173-184, 2009.

H. Cai, Z. Shao, and A. Vaynberg, Certified self-modifying code, pp.66-77, 2007.
DOI : 10.1145/1273442.1250743

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.367.9843

S. Debray, K. Coogan, and G. Townsend, On the semantics of self-unpacking malware code, 2008.

J. Marion and D. Reynaud, Surfing on code waves, LORIA, Tech. Rep, 2009.

N. Jones, Computer implementation and applications of kleene's S-m-n and recursive theorems, Lecture Notes in Mathematics Logic From Computer Science, Y. N. Moschovakis, pp.243-263, 1991.

V. Uspenskii, Enumeration operators and the concept of program, 1956.

H. Rogers, Theory of Recursive Functions and Effective Computability, 1967.

G. Bonfante, M. Kaczmarek, and J. Marion, On Abstract Computer Virology from a Recursion Theoretic Perspective, Journal in Computer Virology, vol.23, issue.3, pp.3-4, 2006.
DOI : 10.1007/s11416-005-0007-4

URL : https://hal.archives-ouvertes.fr/inria-00115199

Y. Futamura, Partial evaluation of computing process? an approach to a compiler-compiler, Systems, Computers, Controls, pp.45-50, 1971.