Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1

Figure 10.1A trivial opaque predicate that is always going to be evaluated to False at
runtime.


Figure 10.2A reversed opaque predicate that is always going to be evaluated to True at
runtime.


True 2 == 2 False

Program

Continues...

Unreachable

Junk Bytes

True 1 == 2 False

Unreachable

Junk Bytes

Program

Continues...

Antireversing Techniques 339
Free download pdf