Question
a.
Duplicating functions to any place in the program that calls them
b.
Replacing every call into a function with an actual in-place copy of it
c.
Taking a certain code sequence and creating a new function that contains just that sequence
d.
None of the above
Posted under Reverse Engineering
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is outlining in the context of obfuscation?
Similar Questions
Discover Related MCQs
Q. How can inlining and outlining be combined to create an effective obfuscation technique?
View solution
Q. What is code interleaving?
View solution
Q. Why is code interleaving considered a potent obfuscation technique?
View solution
Q. What is an opaque predicate in the context of code interleaving?
View solution
Q. Why is an unconditional jump not used in place of an opaque predicate?
View solution
Q. What determines the effectiveness of opaque predicates in fooling human reversers?
View solution
Q. What is an additional obfuscation technique that can be used in conjunction with code interleaving?
View solution
Q. What is the advantage of using the additional obfuscation technique with code interleaving?
View solution
Q. What is the purpose of ordering transformations?
View solution
Q. Why is it not always possible to change the order of operations in a program?
View solution
Q. Who would find ordering transformations more relevant?
View solution
Q. What is the benefit of shuffling the order of operations in a program?
View solution
Q. What are data transformations in obfuscation?
View solution
Q. Why do data transformations make sense in obfuscation?
View solution
Q. What is an example of modifying variable encoding?
View solution
Q. Why is modifying variable encoding better applied at the binary level?
View solution
Q. What is restructuring arrays?
View solution
Q. What are some forms of restructuring arrays?
View solution
Q. What is the purpose of restructuring arrays?
View solution
Q. Can an automated deobfuscator reconstruct the original layout of the array after it has been restructured?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Reverse Engineering? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!