Which type of attack can exploit design flaws in the implementation of an application without going noticed?