1. Anckaert, B., Madou, M., Sutter, B.D., Bus, B.D., Bosschere, K.D., Preneel, B.: Program obfuscation: a quantitative approach. In: Proceedings of the 2007 ACM Workshop on Quality of Protection, QoP 2007, pp. 15–20. ACM, New York (2007)
2. Bichsel, B., Raychev, V., Tsankov, P., Vechev, M.: Statistical deobfuscation of android applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 343–355. ACM, New York (2016)
3. Bohannon, D.: Invoke-obfuscation.
https://github.com/danielbohannon/Invoke-Obfuscation
4. Bohannon, D., Holmes, L.: Revoke-obfuscation (2017).
https://github.com/danielbohannon/Revoke-Obfuscation
5. Bohannon, D., Holmes, L.: Revoke-obfuscation: powershell obfuscation detection using science (2017).
https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/revoke-obfuscation-report.pdf