Category:Digital-Forensics/Computer-Forensics/Anti-Reverse-Engineering/Return-Pointer-Abuse
Jump to navigation
Jump to search
You are here | Return Pointer Abuse
|
Description
This technique consists of placing a rogue retn instruction in the middle of a function in order to fool the disassembler. As consequences, the disassembler won't be able to identify cross-references of the function and will also terminate it prematurely.
This category currently contains no pages or media.