Linked Presentation: Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android KernelsSLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux KernelVoodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC