Provided by: SecurityTube.net
Date Added: Apr 2014
Over the past decade, malware transitioned from attacking a single program to subverting the OS kernel by means of what is known as a root-kit. While computer systems require patches to fix newly discovered vulnerabilities, undiscovered vulnerabilities potentially remain. Signature-based schemes seek to detect malware with a known signature or digital fingerprint.