1. 2011. Disassembler. Technical Report. http://www.hex-rays.com/idapro/ 2011. Disassembler. Technical Report. http://www.hex-rays.com/idapro/
2. Domagoj Babic Daniel Reynaud and Dawn Song. 2011. Malware Analysis with Tree Automata Inference. In CAV. 116–131. Domagoj Babic Daniel Reynaud and Dawn Song. 2011. Malware Analysis with Tree Automata Inference. In CAV. 116–131.
3. J. Bergeron , M. Debbabi , J. Desharnais , M. Erhioui , Y. Lavoie , and N. Tawbi . 2001 . Static Detection of Malicious Code in Executable Programs. In Symposium on Requirements Engineering for Information Security. 1–8. J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie, and N. Tawbi. 2001. Static Detection of Malicious Code in Executable Programs. In Symposium on Requirements Engineering for Information Security. 1–8.
4. On Abstract Computer Virology from a Recursion Theoretic Perspective
5. Guillaume Bonfante , Matthieu Kaczmarek , and Jean-Yves Marion . 2007 . Control Flow Graphs as Malware Signatures . In International Workshop on the Theory of Computer Viruses. Guillaume Bonfante, Matthieu Kaczmarek, and Jean-Yves Marion. 2007. Control Flow Graphs as Malware Signatures. In International Workshop on the Theory of Computer Viruses.