Theory: Understanding how antiviruses detect threats, Signatures
Please see the PDFÂ attached