An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
Annice
9 days agoGoldie
11 days agoJame
14 days agoLatrice
16 days agoMireya
17 days agoKenny
19 days agoAudra
23 days ago