Using Control-Flow Techniques in a Security Context: A Survey on Common Prototypes and Their Common Weakness | IEEE Conference Publication | IEEE Xplore