Building malware infection trees | IEEE Conference Publication | IEEE Xplore