1. Diffie, W. and Hellman, M., New directions in cryptography, IEEE Trans. Inf. Theory, 1976, vol. 22, no. 6, pp. 644–654.
2. Collberg, C., Thomborson, C., and Low, D., A taxonomy of obfuscating transformations, Tech. Report, no. 148, Dept. of Computer Science, Univ. of Auckland, 1997.
3. Cohen, F., Operating system protection through program evolution, Comput. Security, 1993, vol. 12, no. 6, pp. 565–584.
4. Chess, D. and White, S., An undetectable computer virus, Proc. of the 2000 Virus Bulletin Conf., Orlando, 2000.
5. Szor, P. and Ferrie, P., Hunting for metamorphic, Proc. of the 2001 Virus Bulletin Conf., 2001, pp. 123–144.