________ is a technique where attackers modify legitimate software to hide a malicious application.WipersExploitsCode cavesWeaponized documents