Finding and extracting crypto routines from malware | IEEE Conference Publication | IEEE Xplore