1. King, J.C.: Symbolic execution and program testing. CACM 19, 385–394 (1976)
2. Salwan, J., Bardin, S., Potet, M.-L.: Symbolic deobfuscation: from virtualized code back to the original. DIMVA, LNCS 10885, 372–392 (2018)
3. Hai, N.M., Ogawa, M., Tho, Q.T.: Obfuscation code localization based on CFG generation of malware. FPS, LNCS 9482, 229–247 (2015)
4. Shervashidze, N., Schweitzer, P., van Leeuwen, E.J., Mehlhorn, K., Borgwardt, K.M.: “Weisfeiler-Lehman Graph Kernels”. J. Mach. Learn. Res. 12, 2539–2561 (2011)
5. Wikipedia.“Cosine similarity.” https://en.wikipedia.org/wiki/Cosine_similarity