Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.