The complexity of a protected application makes it more difficult for an attacker to gather reliable repeated information of the protected parts. If this is an attack which is worrisome for an application, we recommend placing constant tables into heap memory. With White Hawk doing heap fuzzing, statistical analysis becomes very difficult.
White Hawk has the concept of code cloning. During obfuscations, the clone and its original will diverge. At runtime a (pseudo) random generator is used to decide which branch to execute. This aspect has been implemented exactly to prevent dynamic instrumentation from succeeding.