Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 473

Heuristic Detection

What is Heuristic Detection?

Heuristic DetectionA detection method that uses rule-of-thumb indicators — suspicious code patterns, packers, anomalous strings, and API call combinations — to flag likely-malicious files without an exact signature.


Heuristic detection complements signatures by scoring suspicious characteristics of a file or its execution. Static heuristics inspect PE header anomalies, presence of known packers (UPX, Themida), high entropy, code obfuscation, suspicious imports such as VirtualAlloc + WriteProcessMemory + CreateRemoteThread, and risky strings; dynamic heuristics observe behavior in an emulator or lightweight sandbox. The term was popularized in the early 1990s by tools like Frans Veldman's TbScan and Eugene Kaspersky's AVP; today it lives inside most NGAV/EDR engines as a fast pre-filter before deeper ML or cloud lookup. Heuristics catch unknown variants of known families but produce more false positives than signatures, so vendors tune thresholds and combine the score with reputation, prevalence, and behavioral signals before convicting.

Examples

  1. 01

    An AV engine flagging a UPX-packed binary that imports networking APIs and dynamically resolves WinAPI functions.

  2. 02

    TbScan in 1993 detecting a previously unseen virus by recognising classic encryption loops and disk-write patterns.

Frequently asked questions

What is Heuristic Detection?

A detection method that uses rule-of-thumb indicators — suspicious code patterns, packers, anomalous strings, and API call combinations — to flag likely-malicious files without an exact signature. It belongs to the Defense & Operations category of cybersecurity.

What does Heuristic Detection mean?

A detection method that uses rule-of-thumb indicators — suspicious code patterns, packers, anomalous strings, and API call combinations — to flag likely-malicious files without an exact signature.

How does Heuristic Detection work?

Heuristic detection complements signatures by scoring suspicious characteristics of a file or its execution. Static heuristics inspect PE header anomalies, presence of known packers (UPX, Themida), high entropy, code obfuscation, suspicious imports such as VirtualAlloc + WriteProcessMemory + CreateRemoteThread, and risky strings; dynamic heuristics observe behavior in an emulator or lightweight sandbox. The term was popularized in the early 1990s by tools like Frans Veldman's TbScan and Eugene Kaspersky's AVP; today it lives inside most NGAV/EDR engines as a fast pre-filter before deeper ML or cloud lookup. Heuristics catch unknown variants of known families but produce more false positives than signatures, so vendors tune thresholds and combine the score with reputation, prevalence, and behavioral signals before convicting.

How do you defend against Heuristic Detection?

Defences for Heuristic Detection typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Heuristic Detection?

Common alternative names include: Heuristics, Heuristic scanning.

Related terms