Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?