views:

106

answers:

0

I am writing a program that heavily modifies the basic structure of an executable in order to obfuscate it, making disassembly and reverse-engineering tougher. I have a question about the __StaticInit segment. I know that inside an ordinary Mach-O file this segment contains code to initialize static variables. I also know that this code is called according to an array of pointers stored in the __mod_init_func section under the __DATA segment. If the __mod_init_func pointers have been removed, does anyone have any ideas on a way to reliably rebuild an array of pointers to the __StaticInit segment?

I understand this is probably a very obscure question, but I thought, hey, someone out there just might know.