|Informative Information for the Uninformed
During the course of this paper, the reader has had a chance to
learn about the different types of loops and some of the method of
detecting them. The reader has also gotten an in-depth view of the
new IDA plug-in released with this article. Hopefully now when the
reader sees a loop, whether in code or binary, the reader can
explore the loop and determine if it is a security risk or not.