Reading Questions

Remember to submit your answer to this question BEFORE the next class.

Please refer to figure 4.9 on page 78 of the Computer Security. Why does the stack need to be filled with NOPs?