Hunting Malware: An Example Using Gh0st | IEEE Conference Publication | IEEE Xplore