Answer:
Attackers construct ROP chains by chaining together sequences of "gadgets" to form a series of instructions that achieve the desired malicious behavior.
Attackers construct ROP chains by chaining together sequences of "gadgets" to form a series of instructions that achieve the desired malicious behavior.
You may be interested in:
Web Security MCQs