![]() |
Informative Information for the Uninformed | ![]() |
||||||||||||
![]() |
![]() |
|||||||||||||
![]() ![]() |
![]() |
|
||||||||||||
![]() |
Conclusion
During the course of this paper, the reader has had a chance to
learn about the different types of loops and some of the method of
detecting them. The reader has also gotten an in-depth view of the
new IDA plug-in released with this article. Hopefully now when the
reader sees a loop, whether in code or binary, the reader can
explore the loop and determine if it is a security risk or not.
|