Source: https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-soska.pdf