Transparent and Precise Malware Analysis Using Virtualization: From Theory to Practice