Integrity Checking

These transformations impede the attacker's ability to modify the program, or allows us to check if we're being monitored at runtime.