Linked Presentation: Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android KernelsVoodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC