1
0

thesis: Move Related Work to beginning

This commit is contained in:
2025-08-31 21:38:45 +02:00
parent 63e9ca046f
commit 783ef586f8
4 changed files with 6 additions and 6 deletions

View File

@@ -3,12 +3,12 @@
This chapter gives a rough overview on techniques and methods to intercept or hook system calls and function calls. This chapter gives a rough overview on techniques and methods to intercept or hook system calls and function calls.
See also Section~\ref{sec:methods-for-intercepting}. See also Section~\ref{sec:methods-for-intercepting}.
Many methods have already been discussed there. Some relevant methods will be discussed there in more detail.
\section{Function Call Interception}\label{sec:function-call-interception} \section{Function Call Interception}\label{sec:function-call-interception}
All related work regarding function call interception has already been mentioned in the aforementioned Section. All related work regarding function call interception is mentioned in the aforementioned Section.
See \texttt{ltrace} (Subsection~\ref{subsec:ltrace}), wrapper functions (Subsection~\ref{subsec:wrapper-functions}), and \texttt{LD\_PRELOAD} (Subsection~\ref{subsec:preloading}). See \texttt{ltrace} (Subsection~\ref{subsec:ltrace}), wrapper functions (Subsection~\ref{subsec:wrapper-functions}), and \texttt{LD\_PRELOAD} (Subsection~\ref{subsec:preloading}).
@@ -18,7 +18,7 @@ This section discusses further related work regarding system call interception.
This excludes techniques already discussed in Section~\ref{sec:methods-for-intercepting}, This excludes techniques already discussed in Section~\ref{sec:methods-for-intercepting},
like \texttt{ptrace} (Subsection~\ref{subsec:ptrace}), and \texttt{strace} (Subsection~\ref{subsec:strace}). like \texttt{ptrace} (Subsection~\ref{subsec:ptrace}), and \texttt{strace} (Subsection~\ref{subsec:strace}).
Almost all following methods use binary rewriting to replace system calls with other instructions (except SUD, Subsection~\ref{subsec:syscall-user-dispatch}). Almost all following methods use binary rewriting to replace system calls with other instructions (except SUD, Subsection~\ref{subsec:syscall-user-dispatch}).
This is one of the reasons why they were not mentioned in Section~\ref{sec:methods-for-intercepting}. This is one of the reasons why they are not mentioned in Section~\ref{sec:methods-for-intercepting}.
Another reason is that this work focuses on function call interception rather than system call interception. Another reason is that this work focuses on function call interception rather than system call interception.

View File

@@ -158,9 +158,9 @@
% Switch to arabic numbering and start the enumeration of chapters in the table of content. % Switch to arabic numbering and start the enumeration of chapters in the table of content.
\mainmatter \mainmatter
\input{src/01.introduction} \input{src/01.introduction}
\input{src/02.intercept} \input{src/02.related-work}
\input{src/03.manipulate} \input{src/03.intercept}
\input{src/04.related-work} \input{src/04.manipulate}
\input{src/05.evaluation} \input{src/05.evaluation}
\input{src/06.conclusion} \input{src/06.conclusion}
\backmatter \backmatter