Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection