Suppose that you want to handle some secret data in C and, in the wake of some high-profile vulnerability or other, want to take precautions against your secret being leaked
more here........http://www.lshift.net/blog/2014/06/30/optimising-compilers-as-adversaries
more here........http://www.lshift.net/blog/2014/06/30/optimising-compilers-as-adversaries