1 |
Return-oriented attacksAn exploit technique in which the attacker uses control of the call stack to indirectly execute cherry-picked machine instructions immediately prior to the return instruction in subroutines within the [..]
|
<< Resource optimization | Reverse engineering >> |