L. Böhne, Pandora's bochs: Automatic unpacking of malware, 2008.

D. L. Bruening, Efficient, Transparent, and Comprehensive Runtime Code Manipulation, 2004.

S. Cesare and Y. Xiang, A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.721-728, 2010.
DOI : 10.1109/AINA.2010.121

J. Clause, W. Li, and A. Orso, Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, p.206, 2007.
DOI : 10.1145/1273463.1273490

A. Dinaburg, P. Royal, M. Sharif, and W. Lee, Ether, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.51-62, 2008.
DOI : 10.1145/1455770.1455779

P. Ferrie, Anti-unpacker tricks, Proc. of the 2nd International CARO Workshop, 2008.

Y. Futamura, Partial evaluation of computation process ? an approach to a compilercompiler, Higher-Order and Symbolic Computation, pp.381-391, 1999.

F. Guo, P. Ferrie, and T. Chiueh, A Study of the Packer Problem and Its Solutions, Recent Advances in Intrusion Detection, pp.98-115, 2008.
DOI : 10.1007/978-3-540-87403-4_6

N. D. Jones, C. K. Gomard, and P. Sestoft, Partial evaluation and automatic program generation, 1993.

S. Josse, Secure and advanced unpacking using computer emulation, Journal in Computer Virology, vol.3, issue.3, pp.221-236, 2007.
DOI : 10.1007/s11416-007-0046-0

M. G. Kang, P. Poosankam, and H. Yin, Renovo, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, p.53, 2007.
DOI : 10.1145/1314389.1314399

C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser et al., Pin: building customized program analysis tools with dynamic instrumentation, PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.190-200, 2005.

L. Martignoni, M. Christodorescu, and S. Jha, OmniUnpack: Fast, Generic, and Safe Unpacking of Malware, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.431-441, 2007.
DOI : 10.1109/ACSAC.2007.15

A. Moser, C. Kruegel, and E. Kirda, Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.231-245, 2007.
DOI : 10.1109/SP.2007.17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2410

M. O. Myreen, Verified just-in-time compiler on x86, ACM SIGPLAN Notices, vol.45, issue.1, pp.107-118, 2010.
DOI : 10.1145/1707801.1706313

J. Newsome and D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium, 2005.

A. Rigo, Representation-based just-in-time specialization and the psyco prototype for python PLAN symposium on Partial evaluation and semantics-based program manipulation, Proceedings of the 2004 ACM SIG, pp.15-26, 2004.

P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee, PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.289-300, 2006.
DOI : 10.1109/ACSAC.2006.38

D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager et al., BitBlaze: A New Approach to Computer Security via Binary Analysis, Information Systems Security, pp.1-25, 2008.
DOI : 10.1007/978-3-540-73368-3_52

L. Sun, T. Ebringer, and S. Boztas, Humpand-dump: efficient generic unpacking using an ordered address execution histogram, 2008.

P. Szor, The art of computer virus research and defense, 2005.

F. Tip, A survey of program slicing techniques, Journal of programming languages, vol.3, issue.3, pp.121-189, 1995.

P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel et al., Cross site scripting prevention with dynamic data tainting and static analysis, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2007.

H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, p.127, 2007.
DOI : 10.1145/1315245.1315261