1. Draft Federal Law no. 47571-7 “On the Security of the Critical Information Infrastructure of the Russian Federation.” http://asozd2.duma.gov.ru/main.nsf/(Spravka)?OpenAgent&RN=47571-7.
2. Kozachok, A.V., Kochetkov, E.V., and Tatarinov, A.M., Substantiation of the possibility to construct a heuristic mechanism for malware recognition based on static analysis of executable files, Vestn. Komp’yut. Inf. Tekhnol., 2017, no. 3, pp. 50–56.
3. Kozachok, A.V. and Kochetkov, E.V., Substantiation of the possibility to apply program verification to malicious code detection, Vopr. Kiberbezopasnosti, 2016, vol. 16, no. 3, pp. 25–32.
4. Kinder, J., et al., Detecting malicious code by model checking, Proc. Int. Conf. Detection of Intrusions and Malware and Vulnerability Assessment, Berlin: Springer, 2005, pp. 174–187.
5. Song, F. and Touili, T., Efficient malware detection using model-checking, Proc. Int. Symp. Formal Methods, Berlin: Springer, 2012, pp. 418–433.