1. Blazytko, T.: Analysis of virtualization-based obfuscation. In: r2con2021, editor, r2con2021 - witchcraft edition (2021)
2. Bouverot, M.: Shallow description of the python virtual machine
3. Dang, B., Gazet, A., Bachaalany, E., Josse, S.: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. Wiley, Hoboken (2014)
4. Lecture Notes in Computer Science;A Ignatiev,2018
5. Jones, N.: Computability and Complexity: From a Programming Perspective. The MIT Press, Cambridge (1997)