diff --git a/document/Dissertation/LaTeX file/00_Thesis.pdf b/document/Dissertation/LaTeX file/00_Thesis.pdf
index 4f49add0f990a3a604ec47f25458c250a2669cb6..1b5d667fbb591af99628d3c99e69110fc84ab2a4 100644
Binary files a/document/Dissertation/LaTeX file/00_Thesis.pdf and b/document/Dissertation/LaTeX file/00_Thesis.pdf differ
diff --git a/document/Dissertation/LaTeX file/00_Thesis.synctex.gz b/document/Dissertation/LaTeX file/00_Thesis.synctex.gz
index 27ac03540399d202a2746386e8ecf15248f252e6..a79d0afefc83e9093f3e524b7e704b823c6f1846 100644
Binary files a/document/Dissertation/LaTeX file/00_Thesis.synctex.gz and b/document/Dissertation/LaTeX file/00_Thesis.synctex.gz differ
diff --git a/document/Dissertation/LaTeX file/04_DesignAndImplementation.tex b/document/Dissertation/LaTeX file/04_DesignAndImplementation.tex
index 9fb2cf1527a5c0a73116c5a7710e7f7c703fb80c..7bd94f5c780e08c739068c9a4d1f0937b3e1a140 100644
--- a/document/Dissertation/LaTeX file/04_DesignAndImplementation.tex	
+++ b/document/Dissertation/LaTeX file/04_DesignAndImplementation.tex	
@@ -118,7 +118,7 @@
         \item Modified the data structure to storing it
     \end{enumerate}
 
-    These three functions will be discussed in this section.
+    These three functions will be discussed in this section. If you'd like to check out the full coding of the tool, you can check out the Git project online (\cite{ProjectYD}). 
 
     \subsection{Request listening and extracting}
 
diff --git a/document/Dissertation/LaTeX file/06_ConclusionAndFurtherWork.tex b/document/Dissertation/LaTeX file/06_ConclusionAndFurtherWork.tex
index abafb3b9c9372b1369efdf5d444d2ab571e86076..cef7d9721b8d1121fb97cf189402ec87738d4ed2 100644
--- a/document/Dissertation/LaTeX file/06_ConclusionAndFurtherWork.tex	
+++ b/document/Dissertation/LaTeX file/06_ConclusionAndFurtherWork.tex	
@@ -21,4 +21,14 @@
         \item The tool use MySQL as the database, but MySQL doesn't fit our need. MySQL has a length limitation for all variable stored in the table (\cite{MySQLManual}), a XSS payload can get longer than that. To fix this, we also store full request in a .txt file, but we can also change the database to allow longer string input, one possible solution is  MongoDB.
         \item Only detection is not enough for protect the application from XSS attack, if we want to protect the server, a filter can be added to clean up the suspicious input or encode it into a safe format (like HTMLencode() function). This tool only listen to the port, it can not manipulate the request data, but if we can modify the data, then a protection method can be added.
         \item As this tool use pattern machine technique, it can be used in all kinds of attack that related to user input, like SQL injection and code execution. This can be added as future function of the tool.
-    \end{enumerate}
\ No newline at end of file
+    \end{enumerate}
+
+\section{Legal aspect}
+
+    There is one legal aspect about this project should be discussed. the main point is that our tool been build in this tool is a tool that is designed to be used for protect a server, not attacking one. 
+
+    To make sure the tool won't be used for attacking a server, this tool use pycap package, which is Python package for internet package listening, it can only be used to log the package go through, not modifying it. this make sure that the tool can be used for changing the data in Package. 
+    
+    What's more, all the method been used in the program are not able to modify the data except the data in the file been created by the tool and the MySQL table created by this tool. So the tools won't change the data except data not related to the file.
+
+    In conclusion, the tool only has the ability to listen to the package, not modifying it, and the tool can only make changes to the data in that is related to this program, so it could not be used for attack a server as it is not designed to be able to do it.
\ No newline at end of file
diff --git a/document/Dissertation/LaTeX file/ECS.bib b/document/Dissertation/LaTeX file/ECS.bib
index 5b1dd2b72535894a04ccc8f20105f2cd5bb11bfb..1fa0514404e003fe76b03f26db00e6ad8000ea98 100644
--- a/document/Dissertation/LaTeX file/ECS.bib	
+++ b/document/Dissertation/LaTeX file/ECS.bib	
@@ -17,6 +17,14 @@ note          = {Aviliable:\\ \url{https://www.cvedetails.com/vulnerabilities-by
   note         = {Aviliable:\\ \url{https://dev.mysql.com/doc/refman/8.0/en/char.html}, accessed on September 12, 2020},
 }
 
+@misc{ProjectYD,
+  author       = "{Yang Ding}",
+  title        = {A detection method for cross-site scripting},
+  howpublished = {[online]},
+  year         = {2020},
+  note         = {Aviliable:\\ \url{https://git.soton.ac.uk/yd4u19/msc-project_yd}, accessed on September 15, 2020},
+}
+
 @misc{OWASP,
   author       = "{The Open Web Application Security Project}",
   title        = {OWASP Top Ten},