An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
Annice
17 hours agoGoldie
2 days agoJame
5 days agoLatrice
7 days agoMireya
8 days agoKenny
10 days agoAudra
14 days ago