. Dynamorio,

. Openfst,

M. Apel, C. Bockermann, and M. Meier, Measuring similarity of malware behavior, IEEE Conference on Local Computer Networks, pp.891-898, 2009.

P. Beaucamps, I. Gnaedig, and J. Marion, Behavior Abstraction in Malware Analysis-Extended Version. HAL-INRIA Open Archive Number inria-00509486
URL : https://hal.archives-ouvertes.fr/inria-00509486

J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y. Lavoie et al., Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001.

G. Bonfante, M. Kaczmarek, and J. Marion, Architecture of a morphological malware detector, Journal in Computer Virology, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00330022

D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song et al., Automatically identifying trigger-based behavior in malware, Botnet Detection, vol.36, pp.65-88, 2008.

D. Bruschi, L. Martignoni, and M. Monga, Detecting self-mutating malware using control-flow graph matching, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, vol.4064, pp.129-143, 2006.

M. Christodorescu, S. Jha, A. Sanjit, D. Seshia, R. E. Song et al., Semantics-aware malware detection, IEEE Symposium on Security and Privacy, pp.32-46, 2005.

F. Cohen, Computer viruses: Theory and experiments, Computers and Security, vol.6, issue.1, pp.22-35, 1987.

T. Dullien and R. Rolles, Graph-based comparison of executable objects, Symposium sur la Sécurité des Technologies de l'Information et des Télécommunications, 2005.

J. Esparza, P. Rossmanith, and S. Schwoon, A uniform framework for problems on context-free grammars, Bulletin of the EATCS, vol.72, pp.169-177, 2000.

P. Godefroid, M. Y. Levin, and D. Molnar, Automated whitebox fuzz testing, Network Distributed Security Symposium. Internet Society, 2008.

C. A. Gunter, Semantics of Programming Languages: Structures and Techniques, 1992.

G. Jacob, H. Debar, and E. Filiol, Malware behavioral detection by attribute-automata using abstraction from platform and language, International Symposium on Recent Advances in Intrusion Detection, vol.5758, pp.81-100, 2009.

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Detecting malicious code by model checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, vol.3548, pp.174-187, 2005.

A. Baudouin-le-charlier, M. Mounji, and . Swimmer, Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995.

L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, A layered architecture for detecting malicious behaviors, International symposium on Recent Advances in Intrusion Detection, vol.5230, pp.78-97, 2008.

A. Moser, C. Kruegel, and E. Kirda, Exploring multiple execution paths for malware analysis, IEEE Symposium on Security and Privacy, pp.231-245, 2007.

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, IEEE Symposium on Security and Privacy, pp.144-155, 2001.

K. Prabhat, A. Singh, and . Lakhotia, Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003.