A red team blue team approach towards a secure processor design with hardware shadow stack | IEEE Conference Publication | IEEE Xplore