“…In addition to securing user-level application software against such threats, it has also been applied to harden smartphones [14,39,49], embedded systems [3], hypervisors [63], and operating system kernels [13,25,33]. CFI-enforcing hardware is also being investigated [15,16,18,24,28,42,68,70].…”