A Taxonomy of Defenses against Memory Corruption Attacks | IEEE Conference Publication | IEEE Xplore