thesis: Start Chapter 1
This commit is contained in:
@@ -11,7 +11,7 @@ For that see Chapter~\ref{ch:manipulating-function-calls}.
|
||||
\section{Identified Methods for Intercepting Function and System Calls}\label{sec:methods-for-intercepting}
|
||||
|
||||
First, one has to answer the question on \textit{how exactly} to intercept function or system calls.
|
||||
At the beginning of this work it was not yet determined if the interception of function calls, system calls, or both should be used to achieve the overarching goal (see\todo{Goals}).
|
||||
At the beginning of this work it was not yet determined if the interception of function calls, system calls, or both should be used to achieve the overarching goal (see Section~\ref{sec:motivation-and-goal}).
|
||||
This first section tries to list all possible methods on how to intercept function or system calls but does not claim completeness.
|
||||
The order of the following subsections is roughly based on the thought process on finding the most appropriate method suitable for this work.
|
||||
|
||||
@@ -217,7 +217,7 @@ Although, one has to be aware that not only function calls inside the targeted b
|
||||
\subsection{Conclusion}\label{subsec:methods-for-intercepting-conclusion}
|
||||
|
||||
During the research on different approaches to intercepting system and function calls,
|
||||
it has been found that the most reliable way to achieve the goals of this work (see \todo{Goals}) is to intercept function calls instead of system calls.
|
||||
it has been found that the most reliable way to achieve the goals of this work (see Section~\ref{sec:motivation-and-goal}) is to intercept function calls instead of system calls.
|
||||
This is because (as long as the programs to test are dynamically linked), intercepting function calls allows one to intercept many more calls and in a more flexible way.
|
||||
Therefore, from now on this work only considers function calls and no system calls directly.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user