Binary Code Security: The Source of Vulnerability, Exploitation and Mitigation Techniques | IEEE Conference Publication | IEEE Xplore