An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks | IEEE Conference Publication | IEEE Xplore