How to Counter Control Flow Tampering Attacks | IEEE Conference Publication | IEEE Xplore