“…These include software-based control flow integrity techniques such as [4], [5], [6], [7], [8], and hardware-based techniques such as [2], [9], [10], [11], [12], [13], [14]. However, these approaches either do not protect against CRAs or suffer from high performance overheads.…”