[1] Abrial, J.R.: The B Book - Assigning Programs to Meanings. Cambridge University Press (1996) ISBN 052149619-5 [2] Boomerang: a general, open source, retargetable decompiler of machine code programs, http://boomerang.sourceforge.net/ [3] Bryant, R.E., O’Hallaron, D.R.: Computer Systems – A programmer’s Perspective, 2nd edn. Addison Wesley (2010) ISBN 0136108040 [4] Eymery, D., Eymery, O., Borello, J.-M., Fraygefond, J.-M., Bion, P.: GenDbg: un débogueur générique. In: Symposium Sur la Séurité des Technologies de l’information et des Communications, SSTIC 2008, France (2008) [5] GDB: The GNU Project Debugger, http://www.gnu.org/software/gdb/documentation/ [6] GNU Binutils, http://www.gnu.org/software/binutils/ [7] Google Code, http://code.google.com/ [8] Google Data APIs, http://code.google.com/p/gdata-objectivec-client/ [9] IDA Pro multi-processor disassembler and debugger, http://www.hex-rays.com/products/ida/index.shtml [10] IDA Pro Re-Google Plugin, http://regoogle.carnivore.it/ [11] Lagadec, P.: Dynamic Malware Analysis for Dummies. In: Symposium Sur la Sécurité des Technologies de l’information et des Communications, SSTIC 2008, France (2008) [12] Precise Calculator Project, http://sourceforge.net/projects/preccalc/ [13] Sikorski, M., Honig, A.: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press (2012) ISBN 1593272901 [14] The Hex-Rays Decompiler, http://www.hex-rays.com/ [15] Troshina, K., Chernov, A., Derevenets, Y.: C Decompilation: Is It Possible? In: Proceedings of International Workshop on Program Understanding, Altai Mountains, Russia, pp. 18–27 (2009) [16] Troshina, K., Derevenets, Y., Chernov, A.: Reconstruction of Composite Types for Decompilation. In: Proceedings of the 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation, SCAM 2010, Timisoara, Romania, pp. 179–188 (2010) [17] Valgrind – a suite of tools for debugging and profiling, http://valgrind.org/ [18] WinDbg debugger for Microsoft Windows, http://www.windbg.org/