Mining malware secrets | IEEE Conference Publication | IEEE Xplore