Synthesizing near-optimal malware specifications from suspicious behaviorsSomesh JhaMatthew Fredriksonet al.2013MALWARE 2013