Simple Strategies for In-Depth Malware Defense