“…A plethora of defense techniques and approaches have been proposed and applied in different domains and contexts for the above-mentioned issues. Among these techniques are Security Policy Enforcement ( Herrmann & Murari, 2004 ; Sicari et al, 2016 ; Neisse, Steri & Baldini, 2014 ; Keromytis & Wright, 2000 ; Adi, Hamza & Pene, 2018 ), Language-based Security ( Abadi, Morrisett & Sabelfeld, 2005 ; Bandi, Fellah & Bondalapati, 2019 ; Khan et al, 2019 ; Vaidya et al, 2019 ; Zigmond et al, 2019 ), Formal-language Verification ( Foughali et al, 2018 ; Fragoso Santos et al, 2017 ; Grimm, Lettnin & Hübner, 2018 ; Abbas et al, 2020 ; Halima et al, 2018 ), Software Verification ( Rodriguez, Piattini & Ebert, 2019 ; Feldt et al, 2010 ; Zheng et al, 2014 ; Miksa & Rauber, 2017 ; Zhang et al, 2019b ), and Developing Secure Compiler ( Busi & Galletta, 2019 ; Lee, Jeong & Son, 2017 ; Zúñiga et al, 2020 ; Abate et al, 2020 ; Hastings et al, 2019 ). All of these methods and others share the same approach.…”