1. Mobile threat report;Snell,2016
2. G. AV-TEST, AV-TEST The Independent IT-Security Institute, 2017. https://www.av-test.org/en/statistics/malware/ (Accessed: 14-Jan-2017).
3. Detecting self-mutating malware using control-flow graph matching;Bruschi,2006
4. Malware Obfuscation Techniques: A Brief Survey;You,2010
5. M. Schiffman, A brief history of malware obfuscation: Part 1 of 2, blogs@Cisco — Cisco Blogs, 2010. http://blogs.cisco.com/security/a_brief_history_of_malware_obfuscation_part_1_of_2/ (Accessed: 08-Sep-2014).