Restricting Data Flows to Secure Against Remote Attack | IEEE Conference Publication | IEEE Xplore