Skip to content

Commit bd4a412

Browse files
committed
fix no-break spaces
1 parent f021f32 commit bd4a412

2 files changed

+23
-23
lines changed

Document/0x04c-Tampering-and-Reverse-Engineering.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ In a real world situation, the functions are much more complex than the above ex
190190
- Complex equations generated by symbolic execution may not be solvable by SMT solvers because of their limitations.
191191
- Program is using system calls, library calls or network events which cannot be handled by symbolic execution.
192192

193-
To overcome these challenges, typically, symbolic execution is combined with other techniques such as _dynamic execution_ (also called _concrete execution_) to mitigate the path explosion problem specific to classical symbolic execution. This combination of concrete (actual) and symbolic execution is referred to as _concolic execution_ (the name concolic stems from **conc**rete and symb**olic**), sometimes also called as _dynamic symbolic execution_.
193+
To overcome these challenges, typically, symbolic execution is combined with other techniques such as _dynamic execution_ (also called _concrete execution_) to mitigate the path explosion problem specific to classical symbolic execution. This combination of concrete (actual) and symbolic execution is referred to as _concolic execution_ (the name concolic stems from **conc**rete and symb**olic**), sometimes also called as _dynamic symbolic execution_.
194194

195195
To visualize this, in the above example, we can obtain the value of the external variable by performing further reverse engineering or by dynamically executing the program and feeding this information into our symbolic execution analysis. This extra information will reduce the complexity of our equations and may produce more accurate analysis results. Together with improved SMT solvers and current hardware speeds, concolic execution allows to explore paths in medium-size software modules (i.e., on the order of 10 KLOC).
196196

Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md

+22-22
Original file line numberDiff line numberDiff line change
@@ -71,28 +71,28 @@ The default daily limit for Google Play Services Integrity Verification API requ
7171

7272
```json
7373
{
74-
   "requestDetails": {
75-
     "requestPackageName": "com.example.your.package",
76-
     "timestampMillis": "1666025823025",
77-
     "nonce": "kx7QEkGebwQfBalJ4...Xwjhak7o3uHDDQTTqI"
78-
   },
79-
   "appIntegrity": {
80-
     "appRecognitionVerdict": "UNRECOGNIZED_VERSION",
81-
     "packageName": "com.example.your.package",
82-
     "certificateSha256Digest": [
83-
       "vNsB0...ww1U"
84-
     ],
85-
     "versionCode": "1"
86-
   },
87-
   "deviceIntegrity": {
88-
     "deviceRecognitionVerdict": [
89-
       "MEETS_DEVICE_INTEGRITY"
90-
     ]
91-
   },
92-
   "accountDetails": {
93-
     "appLicensingVerdict": "UNEVALUATED"
94-
   }
95-
 }
74+
"requestDetails": {
75+
"requestPackageName": "com.example.your.package",
76+
"timestampMillis": "1666025823025",
77+
"nonce": "kx7QEkGebwQfBalJ4...Xwjhak7o3uHDDQTTqI"
78+
},
79+
"appIntegrity": {
80+
"appRecognitionVerdict": "UNRECOGNIZED_VERSION",
81+
"packageName": "com.example.your.package",
82+
"certificateSha256Digest": [
83+
"vNsB0...ww1U"
84+
],
85+
"versionCode": "1"
86+
},
87+
"deviceIntegrity": {
88+
"deviceRecognitionVerdict": [
89+
"MEETS_DEVICE_INTEGRITY"
90+
]
91+
},
92+
"accountDetails": {
93+
"appLicensingVerdict": "UNEVALUATED"
94+
}
95+
}
9696
```
9797

9898
#### Programmatic Detection

0 commit comments

Comments
 (0)