Specification and evaluation of polymorphic shellcode properties using a new temporal logic Mehdi TalbiMohamed MejriAdel Bouhoula Original Paper 01 July 2008 Pages: 171 - 186
Fragmented malware through RFID and its defenses Madhu K. ShankarapaniAnthonius SulaimanSrinivas Mukkamala Original Paper 12 December 2008 Pages: 187 - 198
Code mutation techniques by means of formal grammars and automatons Pavel V. Zbitskiy Original Paper 15 April 2009 Pages: 199 - 207
Extended recursion-based formalization of virus mutation Philippe Beaucamps EICAR 2008 Extended Version 10 July 2008 Pages: 209 - 219
Detection of metamorphic and virtualization-based malware using algebraic specification Matt WebsterGrant Malcolm Eicar 2008 extended version 22 July 2008 Pages: 221 - 245
Functional polymorphic engines: formalisation, implementation and use cases Grégoire JacobEric FiliolHervé Debar Eicar 2008 extended version 16 July 2008 Pages: 247 - 261
Architecture of a morphological malware detector Guillaume BonfanteMatthieu KaczmarekJean-Yves Marion Eicar 2008 extended version 27 September 2008 Pages: 263 - 270