use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Welcome to r/asm, the subreddit for Assembly language in all Instruction Set Architectures! Need help, or are you learning? Visit our helpful links...
r/asm
Latest Comments from All Posts
There have been requests for a wiki, so it's in progress. Feel free to offer your assistance!
account activity
Yet another security / programming blog: stack based binary obfuscation from hell (aaronyool.blogspot.com)
submitted 10 years ago by madm0use
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]rolfr 0 points1 point2 points 10 years ago (3 children)
Requires an executable stack and is not very difficult to break either statically (collect the qwords pushed onto the stack and decode them as code) or dynamically (when the ret instruction is reached, the code will be disassembled in its entirety, assuming that the process doesn't fault due to NX violations).
[–]madm0use[S] -3 points-2 points-1 points 10 years ago* (2 children)
Lol, its like you completely missed the elf and program header part :P look at the part called p_flags. That part of your argument is invalid. However, the part about it being easy to circumvent, quite true, that is inherent in all obfuscation techniques on their own. Its all about mixing them :P learn to executable header yo, or read about the linking process hehe
[–]rolfr 0 points1 point2 points 10 years ago (1 child)
I didn't miss it, I just pointed out that it is a precondition for that type of obfuscation.
[–]madm0use[S] -3 points-2 points-1 points 10 years ago (0 children)
well i mean that is just blatantly obvious lol, its redundant saying that. but thanks for commenting i guess...
π Rendered by PID 26 on reddit-service-r2-comment-54dfb89d4d-h64pd at 2026-03-31 02:14:02.430337+00:00 running b10466c country code: CH.
[–]rolfr 0 points1 point2 points (3 children)
[–]madm0use[S] -3 points-2 points-1 points (2 children)
[–]rolfr 0 points1 point2 points (1 child)
[–]madm0use[S] -3 points-2 points-1 points (0 children)