1. 22
  1.  

  2. 4

    Some interesting techniques described, like branchless security checks and pointer poisoning.