Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking | IEEE Conference Publication | IEEE Xplore