S. Bardin, P. Herrmann, and F. Védrine, Refinement-Based CFG Reconstruction from Unstructured Programs, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.54-69, 2011.
DOI : 10.1007/978-3-642-14295-6_27

J. Caballero, N. M. Johnson, S. Mccamant, and D. Song, Binary code extraction and interface identification for security applications, Proc. ISOC Network and Distributed Systems Security Symp. (NDSS), 2010.

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.523-529, 2007.
DOI : 10.1145/1315245.1315286

J. Calvet, Analyse dynamique de logiciels malveillants, 2013.
URL : https://hal.archives-ouvertes.fr/tel-00922384

J. Calvet, C. R. Davis, J. M. Fernandez, J. Marion, P. St-onge et al., The case for in-the-lab botnet experimentation, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.141-150, 2010.
DOI : 10.1145/1920261.1920284

URL : https://hal.archives-ouvertes.fr/inria-00536706

J. Calvet, F. Lalonde-lévesque, J. M. Fernandez, J. Marion, E. Traourouder et al., WaveAtlas: surfing through the landscape of current malware packers, Proc. Virus Bulletin Conf, 2015.

C. Collberg and J. Nagra, Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009.

K. Coogan, S. Debray, T. Kaochar, and G. Townsend, Automatic Static Unpacking of Malware Binaries, 2009 16th Working Conference on Reverse Engineering, pp.167-176, 2009.
DOI : 10.1109/WCRE.2009.24

S. Debray and J. Patel, Reverse Engineering Self-Modifying Code: Unpacker Extraction, 2010 17th Working Conference on Reverse Engineering, pp.131-140, 2010.
DOI : 10.1109/WCRE.2010.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.7193

I. Guilfanov, The ida pro disassembler and debugger

W. Guizani, J. Marion, and D. Reynaud-plantey, Server-side dynamic code analysis, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp.55-62, 2009.
DOI : 10.1109/MALWARE.2009.5403017

URL : https://hal.archives-ouvertes.fr/inria-00425554

F. Guo, P. Ferrie, and T. Chiueh, A Study of the Packer Problem and Its Solutions, Proc. Int. Symp. Recent Advances in Intrusion Detection (RAID), pp.98-115, 2008.
DOI : 10.1007/978-3-540-87403-4_6

J. Gustafsson, A. Betts, A. Ermedahl, and B. Lisper, The Mälardalen WCET benchmarks ? past, present and future, Proc. Int. Work. on Worst-Case Execution Time Analysis (WCET), pp.137-147, 2010.

N. M. Hai, O. Mizuhito, and Q. T. Tho, Pushdown model generation of malware, Japan Advanced Institute of Science and Technology, 2014.

C. Jämthagen, P. Lantz, and M. Hell, A new instruction overlapping technique for anti-disassembly and obfuscation of x86 binaries, 2013 Workshop on Anti-malware Testing Research, 2013.
DOI : 10.1109/WATeR.2013.6707878

M. G. Kang, P. Poosankam, and H. Yin, Renovo, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.46-53, 2007.
DOI : 10.1145/1314389.1314399

J. Kinder, Static analysis of x86 executables, 2010.

J. Kinder and D. Kravchenko, Alternating Control Flow Reconstruction, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.267-282, 2012.
DOI : 10.1007/978-0-387-44599-1_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.498.7032

J. Kinder, F. Zuleger, and H. Veith, An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries, Proc. Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp.214-228, 2009.
DOI : 10.1007/978-3-540-93900-9_19

N. Krishnamoorthy, S. Debray, K. Fligg, C. Kruegel, W. Robertson et al., Static detection of disassembly errors Static disassembly of obfuscated binaries, Proc. IEEE Working Conf. on Reverse Engineering (WCRE) Proc. USENIX Security Symposium, pp.259-268, 2004.

C. Linn and S. Debray, Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003.
DOI : 10.1145/948109.948149

. Reddi, PIN, Proceedings of the 2004 workshop on Computer architecture education held in conjunction with the 31st International Symposium on Computer Architecture, WCAE '04, 2005.
DOI : 10.1145/1275571.1275600

L. Martignoni, M. Christodorescu, and S. Jha, OmniUnpack: Fast, Generic, and Safe Unpacking of Malware, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007.
DOI : 10.1109/ACSAC.2007.15

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007.
DOI : 10.1109/ACSAC.2007.21

S. Nanda, W. Li, L. Lam, and T. Cker-chiueh, BIRD: Binary Interpretation using Runtime Disassembly, International Symposium on Code Generation and Optimization (CGO'06), 2006.
DOI : 10.1109/CGO.2006.6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9928

M. D. Preda, R. Giacobazzi, S. Debray, K. Coogan, and G. Townsend, Modelling metamorphism by abstract interpretation, Proc. Int. Static Analysis Symposium (SAS), pp.218-235, 2010.

T. W. Reps and G. Balakrishnan, Improved Memory-Access Analysis for x86 Executables, Compiler Construction, pp.16-35, 2008.
DOI : 10.1007/978-3-540-78791-4_2

P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee, PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.289-300, 2006.
DOI : 10.1109/ACSAC.2006.38

B. Schwarz, S. Debray, and G. Andrews, Disassembly of executable code revisited, Ninth Working Conference on Reverse Engineering, 2002. Proceedings., p.45, 2002.
DOI : 10.1109/WCRE.2002.1173063

X. Ugarte-pedrero, D. Balzarotti, I. Santos, and P. G. Bringas, SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.46

G. Vigna, Static Disassembly and Code Analysis, Malware Detection of Advances in Information Security, pp.19-41, 2007.
DOI : 10.1007/978-0-387-44599-1_2

B. Yadegari, B. Johannesmeyer, B. Whitely, and S. Debray, A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.47