adplus-dvertising
frame-decoration

Question

How can opaque predicates be used to confuse reversers and automated decompilation tools?

a.

By creating logical statements that are obviously false

b.

By creating logical statements that are difficult to distinguish from the actual program code

c.

By creating global data structures that contain random values

d.

By creating threads that generate new random values and store them in a data structure

Posted under Reverse Engineering

Answer: (b).By creating logical statements that are difficult to distinguish from the actual program code Explanation:Opaque predicates can be used to confuse reversers and automated decompilation tools by creating logical statements that are difficult to distinguish from the actual program code.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. How can opaque predicates be used to confuse reversers and automated decompilation tools?

Similar Questions

Discover Related MCQs

Q. What is the objective of creating opaque predicates?

Q. What is the difference between confusing an automated deobfuscator and confusing a human reverser?

Q. What is the main challenge for an automated deobfuscator in identifying concurrency-based opaque predicates?

Q. How do computation transformations reduce the readability of code?

Q. What are aggregation transformations?

Q. What are ordering transformations?

Q. In which type of programs are opaque predicates more effective?

Q. What is the primary goal of most bytecode obfuscators?

Q. What is one trick that bytecode obfuscators use to confuse decompilers?

Q. Why can adding goto statements into the bytecode break a program's flow graph?

Q. Why is decompilation in native processor languages such as IA-32 machine code complex and fragile?

Q. What is a table interpretation layout obfuscation approach?

Q. What is the purpose of using a table interpretation layout for obfuscation?

Q. How does a table interpretation layout obfuscation approach hide the structure of the code?

Q. What is the role of the jump table in a table interpretation layout obfuscation approach?

Q. What is table interpretation in the context of obfuscation?

Q. How does table interpretation obfuscation make code more difficult to read?

Q. What is an enhancement that can be added to table interpretation obfuscation?

Q. What is the purpose of using pointer aliases in obfuscation?

Q. How do pointer aliases complicate data-flow analysis?