How does a developer prevent an attacker from taking control of a program when the developer is providing the tools to the attacker? What are code reuse attacks and how can the Arm Architecture remove the vulnerabilities? How can someone use these architectural…