adplus-dvertising
frame-decoration

Question

What is the strategy of confusing disassemblers as a means of preventing or inhibiting reversers?

a.

Converting invalid data into valid data

b.

Converting valid data into invalid data

c.

Converting random data into valid data

d.

Converting valid data into random data

Posted under Reverse Engineering

Answer: (b).Converting valid data into invalid data Explanation:In processor architectures that use variable-length instructions, it is possible to trick disassemblers into incorrectly treating invalid data as the beginning of an instruction.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is the strategy of confusing disassemblers as a means of preventing or inhibiting reversers?

Similar Questions

Discover Related MCQs

Q. What is the difference between linear sweep and recursive traversal in disassembly?

Q. Which type of disassembler is more reliable and tolerant of antidisassembly tricks?

Q. Which of the following is NOT a potential effect of confusing disassemblers?

Q. What is an opaque predicate?

Q. What is the difference between linear sweep and recursive traversal disassemblers?

Q. Which disassemblers can properly disassemble code with opaque predicates?

Q. What is the purpose of the pseudorandom values in the macro?

Q. Why is the LINE macro used in the macro?

Q. What is the potential downside of using too many copies of this macro in a program?

Q. Are these techniques effective at deterring experienced and determined reversers from reversing or cracking an application?

Q. What is the recommended approach for implementing powerful antireversing techniques?

Q. What is code obfuscation?

Q. What is potency in code obfuscation?

Q. What is a deobfuscator?

Q. What is the primary goal of many obfuscators?

Q. What is the associated cost of an obfuscating transformation?

Q. What is the primary goal of code obfuscation?

Q. What is potency in the context of code obfuscation?

Q. What is the primary advantage of automatic code obfuscation?

Q. What are control flow transformations?