"Synthesizing near-optimal malware specifications from suspicious behaviors."

Somesh Jha et al. (2013)
a service of Schloss Dagstuhl - Leibniz Center for Informatics