Formulas and Algorithms Used in Opcode Analysis and Threat Assessment | Whitepaper