Automatic extraction of malicious behaviors | IEEE Conference Publication | IEEE Xplore