Question: Cryptography and Security Course Q2) Below are two examples of code fragments, indicated by numbers 1 and 2. 1 2 nov mov MOV INOV MOV

Cryptography and Security Course
Q2) Below are two examples of code fragments, indicated by numbers 1 and 2. 1 2 nov mov MOV INOV MOV lea MOV or lea MOV mov MOV mov TON push mov push dword_1, ON ctx, chord_1 chord_2, ed ebp, dord 2 edi, 32336765h eax, [edi] esi, 0A624540h esi, 46702118h edi, [eax] chrord 4, cdi edx, bp dword_5, edx chord 3, csi edx, offset thword_3 ctlx cord_6, offset CetModuleHandleA dwords chord e cx, dword_% sword ptr ds:0[eix] MOV mov MOV push call chord_3, 6E726548h chords, 32336C65h dhord 5, oh offset cord_3 ds: [Get ModuleHandleA] mov call a) The above two pieces of code are examples of metamorphic software. What is metamorphic software? Explain why metamorphic software is needed. b) From the SRE (Software Reverse Engineering) point of view, can it be interpreted as "A metamorphic piece of code may also have code obfuscation"? Discuss
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
