An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
Hobert
3 months agoElfrieda
1 months agoJusta
2 months agoMillie
2 months agoLeatha
2 months agoGlenn
3 months agoGracia
2 months agoMollie
2 months agoGaynell
2 months agoJutta
3 months agoAnnice
4 months agoGoldie
4 months agoJame
4 months agoGlory
3 months agoChu
3 months agoLatrice
4 months agoLeah
2 months agoWinifred
2 months agoMarsha
2 months agoSheldon
2 months agoElly
3 months agoMicaela
3 months agoFrank
3 months agoMireya
4 months agoKenny
4 months agoAudra
4 months ago