You are about to access our book library "Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) full version" .