Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?