Answer:
Attackers can use "return-oriented programming (ROP)" in ASLR bypass by chaining together existing code snippets (gadgets) with known addresses, constructing reliable attacks.
Attackers can use "return-oriented programming (ROP)" in ASLR bypass by chaining together existing code snippets (gadgets) with known addresses, constructing reliable attacks.
You may be interested in:
Web Security MCQs