August 2019
Intermediate to advanced
342 pages
9h 35m
English
The most commonly used detection strategy is the one that uses signatures associated with executable files recognized as malicious.
This strategy offers undoubted advantages, and is widely implemented by antivirus software.
It is based on the search for specific patterns (consisting of sequences of bits considered representative of the malicious executable), conducting the search of these patterns on each of the files stored in the system, and carrying out the systematic scanning of the resources (including the runtime memory) of the system.
The search for patterns takes place on the basis of a database, which contains the signatures of malicious files. These must be updated promptly and constantly, in order ...
Read now
Unlock full access