ABSTRACT

This Chapter considers common attacks that insert an attack vector into data, programs, or memory. Insertion typically corrupts a legitimate process and hijacks it. We present several instances of insertion attacks and then give a general overview of the abstract problem.