Exploitation Techniques and Defenses for Data-Oriented Attacks | IEEE Conference Publication | IEEE Xplore