Whitepaper called Reverse Engineering Malware Part 1.
36dd2e02c332eee7ad1b0a13487a9cc66d5bcca061c99f0a07d0ec1b39863a5f
Whitepaper called Unprotecting the Crypter, a Generic Approach. It discusses how crypters work and unpacking malware.
937196e8fab2e4560c58ff7b754f08781822ad6da74fc0f1e72386234ca1d6ef