400 words 2 reference

 

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

Tags: No tags