COMPRESSION-BASED ANALYSIS OF METAMORPHIC MALWARE