Please see the video talk and comment on the following questions in your response. Q1. What new techniques did you learn from the paper? What was unclear, if anything, from the paper? [2 points] Q2. State precisely the class of ROP attacks that kBouncer defeats. How practical do you think it is to bypass kBouncer? Give examples. [2 point] Q3. Outline 1 other application of the Intel LBR mechanism to solve any other security problem you know. [1 points]