New directions in covert malware modeling which exploit white-listing | IEEE Conference Publication | IEEE Xplore