Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors | IEEE Conference Publication | IEEE Xplore