Uninformed: Informative Information for the Uninformed

Vol 1» 2005.May


Conclusion

During the course of this paper, the reader has had a chance to learn about the different types of loops and some of the method of detecting them. The reader has also gotten an in-depth view of the new IDA plug-in released with this article. Hopefully now when the reader sees a loop, whether in code or binary, the reader can explore the loop and determine if it is a security risk or not.