paper
http://www.windowsitlibrary.com/Content/356/11/1.html
Blended Attacks - Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses http://www.peterszor.com/blended.pdf
Hunting for Metamorphic http://www.peterszor.com/metamorp.pdf