What is one method of understanding how malware operates?