What other algorithms, besides linear and flow-oriented, are used in disassembling code?

Malware Analysis

Answer the following questions.

1. What other algorithms, besides linear and flow-oriented, are used in disassembling code?

2. What are the benefits and disbenefits of these algorithms?

3. What are structured exception handlers ? How can malware authors abuse SEHs?