Answer:
CFI protects against control flow hijacking attacks, such as ROP attacks, by enforcing a set of rules that restrict the legitimate control flow paths within the program.
CFI protects against control flow hijacking attacks, such as ROP attacks, by enforcing a set of rules that restrict the legitimate control flow paths within the program.
You may be interested in:
Web Security MCQs