Runtime Attacks In-Memory Require a Different Response

https://blog.morphisec.com/runtime-attacks-in-memory