I have observed an uptick in disassembly obfuscation lately (the sort that breaks the analysis performed by IDA Pro). Particularly I see a lot of unconditional jumps one or two bytes ahead where the next opcode represents a 4 or 5 byte instruction. This of course breaks everything since the legitimate jump target is not disassembled. Based on the quantity, I'm quite sure this isn't being hand coded. Any ideas what the toolkit might be producing this effect?