Data void exploits: Tracking and mitigation strategies