Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection