Abstract: As malicious code countermeasures evolve, attackers have responded by generating numerous malicious code variants through shelling, code obfuscation, and similar strategies. Addressing the ...