Pattern matching tends not to be robust because malware variants simply change or
rearrange code. Heuristic approaches such as emulation and runtime analysis may take too
long if the actionable time window is measured in seconds or minutes. My approach is to
find a sweet spot: Structural fingerprints that are statistical in nature,'fuzzier'metrics between
static signatures and dynamic heuristics. One such structural fingerprint is binary opcode …