A technique for finding malicious code such as viruses in an executable
binary file converts the executable binary to a function unique form to
which function unique forms of virus code may be compared. By avoiding
direct comparison of the expression of the viral code but looking instead
at its function, obfuscation techniques intended to hide the virus code
are substantially reduced in effectiveness.