An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
Hobert
1 months agoMillie
12 days agoLeatha
16 days agoGlenn
2 months agoGracia
12 days agoMollie
15 days agoGaynell
19 days agoJutta
1 months agoAnnice
2 months agoGoldie
2 months agoJame
2 months agoGlory
2 months agoChu
2 months agoLatrice
2 months agoLeah
17 days agoWinifred
18 days agoMarsha
19 days agoSheldon
20 days agoElly
1 months agoMicaela
2 months agoFrank
2 months agoMireya
2 months agoKenny
2 months agoAudra
3 months ago