What other algorithms, besides linear and flow-oriented, are used in disassembling code?
Malware Analysis
Answer the following questions.
1. What other algorithms, besides linear and flow-oriented, are used in disassembling code?
2. What are the benefits and disbenefits of these algorithms?
3. What are structured exception handlers ? How can malware authors abuse SEHs?