Practical Run-Time Mitigations Against Data-Oriented Attacks [pdf]