This summer, when we openly publish our software detectioncode, you can take what you find useful for your own work, and then help us make it better for our SETI search.
While their advanced malware protection, essentially an in-line sandbox that executes suspect code, was a first, they did not start to gain momentum until they introduced beaconing detection.
The methods they used to avoid detection were straight out of a crime novel - they wrote cryptic notes using numbers and letters and spoke in code on the phone.