Access control by tracking shallow execution history | IEEE Conference Publication | IEEE Xplore