1. Boomerang,
http://boomerang.sourceforge.net
2. MetaPHOR,
http://securityresponse.symantec.com/avcenter/venc/data/w32.simile.html
3. Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques and Tools. Addison-Wesley, Reading (1986)
4. C. Associates. Security advisor center glossary,
http://www3.ca.com/securityadvisor/glossary.aspx
5. Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting self-mutating malware. In: Proceedings of the International Symposium of Secure Software Engineering, Arlington, VA. IEEE Computer Society, Los Alamitos (2006)