I strongly doubt that, unless they changed something in how the server logs works by now. They don't use heuristics, they are simply detections based on checksums or whatever they use for known hacks. How do you mean they would detect unknown hacks?
Btw talking about them I'm surprised no one has come up with a bypass for those server logs by now. When I was looking into that 1,5 years ago I traced down the exact packet sent upon detection and to where it was going on their servers (a script, presumably for logging the data). Would need to filter out that packet though, which wasn't within the limits of my programming knowledge and still isn't.Then again there might be easier ways to avoid detection, don't know if those HS bypasses are still around or not but I'm guessing it's simplier that way.