Preventing Information Leaks through Shadow Executions | IEEE Conference Publication | IEEE Xplore