Question
a.
The level of complexity added by an obfuscating transformation
b.
The amount of runtime memory consumed by an obfuscated program
c.
The resistance of an obfuscation technique to deobfuscation
d.
The speed at which an obfuscated program runs
Posted under Reverse Engineering
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is potency in the context of code obfuscation?
Similar Questions
Discover Related MCQs
Q. What is the primary advantage of automatic code obfuscation?
View solution
Q. What are control flow transformations?
View solution
Q. What are computation transformations aimed at achieving?
View solution
Q. How do aggregation transformations affect the high-level structure of a program?
View solution
Q. What do ordering transformations do?
View solution
Q. What are opaque predicates?
View solution
Q. How can opaque predicates be used to confuse reversers and automated decompilation tools?
View solution
Q. What is the objective of creating opaque predicates?
View solution
Q. What is the difference between confusing an automated deobfuscator and confusing a human reverser?
View solution
Q. What is the main challenge for an automated deobfuscator in identifying concurrency-based opaque predicates?
View solution
Q. How do computation transformations reduce the readability of code?
View solution
Q. What are aggregation transformations?
View solution
Q. What are ordering transformations?
View solution
Q. In which type of programs are opaque predicates more effective?
View solution
Q. What is the primary goal of most bytecode obfuscators?
View solution
Q. What is one trick that bytecode obfuscators use to confuse decompilers?
View solution
Q. Why can adding goto statements into the bytecode break a program's flow graph?
View solution
Q. Why is decompilation in native processor languages such as IA-32 machine code complex and fragile?
View solution
Q. What is a table interpretation layout obfuscation approach?
View solution
Q. What is the purpose of using a table interpretation layout for obfuscation?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Reverse Engineering? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!