Tracing Privileged Memory Accesses to Discover Software Vulnerabilities (2015).pdf 652 KB