Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
anonion
on Dec 2, 2015
|
parent
|
context
|
favorite
| on:
Anti-Disassembly techniques used by malware
With fixed width instruction sets there are similar tricks that trip up IDA's style of analysis. For example, this MIPS code:
bal 1f nop .word DATA /* some data */ 1: lw REG, 0(ra) /* some destination register */
Despite it being unreachable, it will attempt to disassemble the word after the branch/nop rather than recognizing it as data.
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: