1. 22
    1. 4

      Some interesting techniques described, like branchless security checks and pointer poisoning.