what type of exploit tries to take advantage of the small window of time between when a service is used and its corresponding security control is executed, or when temporary files are created?