This document summarizes a system for classifying malware using control flow graph signatures. It discusses: 1) Using entropy analysis to identify and unpack packed malware through application-level emulation. 2) Generating control flow graph signatures using a "structuring" technique and calculating similarities to signatures in a malware database. 3) Evaluating the system on real malware, showing high similarities between variants and low similarities between unrelated programs.