Malware counter-proliferation and the Wassenaar Arrangement | IEEE Conference Publication | IEEE Xplore