Figure 2


Icebreaker, used by some decompiler hackers, allows the hacker to iterate back to original source by comparing decomplied /recompiled byecode to the original.

Figure 2