1. Runtime packers: The hidden problem;Brosch,2006
2. Exploring the long tail of (malicious) software downloads;Rahbarinia,2017
3. Useful and useless statistics about viruses and anti-virus programs;Morgenstern,2010
4. Modeling obfuscation stealth through code complexity;Schrittwieser,2023
5. Collberg C, Martin S, Myers J, Nagra J. Distributed application tamper detection via continuous software updates. In: Proceedings of the 28th annual computer security applications conference. 2012, p. 319–28.