In this article, we will explore how secure self-integrity implementations can still be hijacked through call hierarchy