Discovering Malicious Signatures in Software from Structural Interactions