1. B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vedhan, and K. Yang, “On the (im)possibility of obfuscating programs,” in: CRYPTO’01—Advances in Cryptology, Lect. Notes Comput. Sci., Vol. 2139, Springer (2001), pp. 1–18.
2. D. Chess and S. White, “An undetectable computer virus,” in: Proc. of the 2000 Virus Bulletin Conference (2000).
3. S. Chow, Y. Gu, H. Johnson, and V. A. Zakharov, “An approach to the obfuscation of control-flow of sequential computer programs,” in: 6th Inf. Security Conf., Lect. Notes Comput. Sci., Vol. 2200, Springer (2001), pp. 144–155.
4. M. Christodorescu and S. Jha, “Static analysis of executables to detect malicious patterns,” in: Proc. of the 12th USENIX Security Symposium (Security’03) (2003), pp. 169–186.
5. M. Christodorescu and S. Jha, “Testing malware detectors,” in: Proc. of the Int. Symp. on Software Testing and Analysis (ISSTA 2004) (2004).