1. Christian Collberg, C. Thomborson, D. Low, A taxonomy of obfuscating transformations, Technical Report 148, Dept. of Computer Science, Univ. of Auckland, 1997.
2. Jean-Maries Borello and Ludovic Me, Code Obfuscation Techniques for Metamorphic Viruses, Springer, 2008.
3. C. Collberg, J. Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Program Protection. Addison-Wesley Professional, 2009.
4. Hideaki Goto, M. Mambo, H. ShiZuya, Y. Watanabe, Evaluation of Tamper-Resistant software deviating from structured programming rules, ACISP, LNCS 2119, pp-145-158, Springer- verilag Berlin Heidelberg, 2001.
5. P. Mishra, A taxonomy of software uniqueness transformations, master's thesis, San Jose State University, 2003.