The Making of Indicator of Compromise using Malware Reverse Engineering Techniques | IEEE Conference Publication | IEEE Xplore