Control Flow Integrity deterministically detects illegitimate memory utilizations
It can block and report events continuously via an external terminal
It minimizes the Security overhead via:
- No false positive
- No extra hardware
- No need for lengthy and expansive investigation of detected anomaly
- No need for constant updates
Seamless integration into the build process
Very low impact on embedded systems performance