adplus-dvertising
frame-decoration

Question

What is potency in code obfuscation?

a.

The level of complexity added by an obfuscating transformation

b.

The number of irrelevant instructions added to the code

c.

The ability to create deobfuscators

d.

The resistance to deobfuscation

Posted under Reverse Engineering

Answer: (a).The level of complexity added by an obfuscating transformation Explanation:The level of complexity added by an obfuscating transformation is typically called potency and can be measured using conventional software complexity metrics such as how many predicates the program contains and the depth of nesting in a particular code sequence.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is potency in code obfuscation?

Similar Questions

Discover Related MCQs

Q. What is a deobfuscator?

Q. What is the primary goal of many obfuscators?

Q. What is the associated cost of an obfuscating transformation?

Q. What is the primary goal of code obfuscation?

Q. What is potency in the context of code obfuscation?

Q. What is the primary advantage of automatic code obfuscation?

Q. What are control flow transformations?

Q. What are computation transformations aimed at achieving?

Q. How do aggregation transformations affect the high-level structure of a program?

Q. What do ordering transformations do?

Q. What are opaque predicates?

Q. How can opaque predicates be used to confuse reversers and automated decompilation tools?

Q. What is the objective of creating opaque predicates?

Q. What is the difference between confusing an automated deobfuscator and confusing a human reverser?

Q. What is the main challenge for an automated deobfuscator in identifying concurrency-based opaque predicates?

Q. How do computation transformations reduce the readability of code?

Q. What are aggregation transformations?

Q. What are ordering transformations?

Q. In which type of programs are opaque predicates more effective?

Q. What is the primary goal of most bytecode obfuscators?