1. Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: Graph-based malware detection using dynamic traces. J. Comput. Virol. 7, 247–258 (2011)
2. Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. Hack. Tech. 9, 179–192 (2013)
3. Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, USENIX, pp. 169–186 (2003)
4. Deng, W., Liu, Q., Cheng, H., Qin, Z.: A malware detection framework based on Kolmogorov complexity. J. Comput. Inf. Syst. 7, 2687–2694 (2011)
5. Eagle, C.: The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler, 2nd edn. No Starch Press, San Francisco (2011)