Understanding Process Switching Through Function Calls and Buffer‑Overflow Exploits
The article explains the essence of process switching by comparing it to function calls, demonstrates how manipulating a function's return address can redirect execution to another function, and shows the underlying assembly and security implications of such control‑flow changes.