Search Evasion Techniques
Names, Techniques, Definitions, Keywords
1 item(s) found so far for this keyword.
This technique works by inserting random bytes in chosen parts of the code. The intention is to make a
disassembler interpret those bytes as a normal code, what would then lead to incorrect disassembly. This technique is usually used in conjunction with some other technique.