An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?
Shaunna
3 months agoStephanie
3 months agoLinsey
3 months agoJuliana
4 months agoDerick
4 months agoMarleen
4 months agoRoyal
4 months agoMarti
4 months agoLorean
5 months agoValentine
5 months agoShawna
5 months agoJolene
5 months agoJenelle
5 months agoCeola
5 months agoLonny
5 months agoKimberely
5 months agoHobert
10 months agoElfrieda
8 months agoJusta
8 months agoMillie
9 months agoLeatha
9 months agoGlenn
10 months agoGracia
9 months agoMollie
9 months agoGaynell
9 months agoJutta
10 months agoAnnice
10 months agoGoldie
10 months agoJame
10 months agoGlory
10 months agoChu
10 months agoLatrice
11 months agoLeah
9 months agoWinifred
9 months agoMarsha
9 months agoSheldon
9 months agoElly
9 months agoMicaela
10 months agoFrank
10 months agoMireya
11 months agoKenny
11 months agoAudra
11 months ago