M. Apel, C. Bockermann, and M. Meier, Measuring similarity of malware behavior, 2009 IEEE 34th Conference on Local Computer Networks, pp.891-898, 2009.
DOI : 10.1109/LCN.2009.5355037

J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie et al., Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001.

G. Bonfante, M. Kaczmarek, and J. Marion, Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, 2008.
DOI : 10.1007/s11416-008-0102-4

URL : https://hal.archives-ouvertes.fr/inria-00330022

V. Ronald, F. Book, and . Otto, String-rewriting systems, 1993.

D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song et al., Automatically Identifying Trigger-based Behavior in Malware, Botnet Detection, vol.36, pp.65-88, 2008.
DOI : 10.1007/978-0-387-68768-1_4

D. Bruschi, L. Martignoni, and M. Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.129-143, 2006.
DOI : 10.1007/11790754_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005.
DOI : 10.1109/SP.2005.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399

F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987.
DOI : 10.1016/0167-4048(87)90122-2

T. Dullien and R. Rolles, Graph-based comparison of executable objects, Symposium sur la Sécurité des Technologies de l'Information et des Télécommunications, 2005.

J. Esparza, P. Rossmanith, and S. Schwoon, A uniform framework for problems on context-free grammars, Bulletin of the EATCS, vol.72, pp.169-177, 2000.

P. Godefroid, M. Y. Levin, and D. Molnar, Automated whitebox fuzz testing, Network Distributed Security Symposium. Internet Society, 2008.

C. A. Gunter, Semantics of Programming Languages: Structures and Techniques, 1992.

G. Jacob, H. Debar, and E. Filiol, Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, International Symposium on Recent Advances in Intrusion Detection, pp.81-100, 2009.
DOI : 10.1007/978-3-642-04342-0_5

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005.
DOI : 10.1007/11506881_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354

A. Baudouin-le-charlier, M. Mounji, and . Swimmer, Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995.

L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008.
DOI : 10.1007/978-3-540-87403-4_5

A. Moser, C. Kruegel, and E. Kirda, Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.231-245, 2007.
DOI : 10.1109/SP.2007.17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2410

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001.
DOI : 10.1109/SECPRI.2001.924295

K. Prabhat, A. Singh, and . Lakhotia, Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003.

F. Laurentiu, T. , and E. Mäkinen, On the complexity of a problem on monadic string rewriting systems, Journal of Automata, Languages and Combinatorics, vol.7, issue.4, pp.599-609, 2002.