[2] Harbour, N.: Advanced Software Armoring and Polymorphic Kung-Fu. DEFCON 16, 2008.
[4] Karnik, A., Goswami, S., Guha, R.: Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Modelling Simulation, 2007.
[5] Low, D.: Protecting Java code via code obfuscation. In: Crossroads – Special Issue on Robotics, 1998.
[7] Moser, A., Kruegel, Ch., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007.