A Survey on Protection Methodologies Against Control Flow Hijacking Attacks | IEEE Journals & Magazine | IEEE Xplore