adplus-dvertising
frame-decoration

Question

How can inlining and outlining be combined to create an effective obfuscation technique?

a.

By duplicating random pieces of code and creating dedicated functions for them

b.

By replacing every call into a function with an actual in-place copy of it and then outlining the duplicated functions

c.

By eliminating the internal abstractions created by the software developer and then outlining the code sequences

d.

None of the above

Posted under Reverse Engineering

Answer: (b).By replacing every call into a function with an actual in-place copy of it and then outlining the duplicated functions Explanation:One interesting enhancement suggested in [Collberg3] is to combine inlining with outlining in order to create a highly potent transformation. This means that you replace every call into a function with an actual in-place copy of it and then outline the duplicated functions.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. How can inlining and outlining be combined to create an effective obfuscation technique?

Similar Questions

Discover Related MCQs

Q. What is code interleaving?

Q. Why is code interleaving considered a potent obfuscation technique?

Q. What is an opaque predicate in the context of code interleaving?

Q. Why is an unconditional jump not used in place of an opaque predicate?

Q. What determines the effectiveness of opaque predicates in fooling human reversers?

Q. What is an additional obfuscation technique that can be used in conjunction with code interleaving?

Q. What is the advantage of using the additional obfuscation technique with code interleaving?

Q. What is the purpose of ordering transformations?

Q. Why is it not always possible to change the order of operations in a program?

Q. Who would find ordering transformations more relevant?

Q. What is the benefit of shuffling the order of operations in a program?

Q. What are data transformations in obfuscation?

Q. Why do data transformations make sense in obfuscation?

Q. What is an example of modifying variable encoding?

Q. Why is modifying variable encoding better applied at the binary level?

Q. What is restructuring arrays?

Q. What are some forms of restructuring arrays?

Q. What is the purpose of restructuring arrays?

Q. Can an automated deobfuscator reconstruct the original layout of the array after it has been restructured?

Q. What is the most significant penalty incurred by most antireversing techniques?