“…At run-time, within the protected volume of the computer system, the processor removes the protection and confirms the instruction and sequence integrity. This method protection over a large portion of the software life cycle from the time it is shrink-wrapped in the trusted facility through the distribution, loading, and storage phases, up to the point where the instructions or data are accessed by the target CPU [2]. More details on the FE concept can be found in earlier works [3], [4], [5].…”