An efficient method for protecting entry addresses in computer programs allows
direct jumps to permissible entry addresses. The permissible entry addresses are
identified with a correlation of data which are not provided within the same individual
instruction. By organizing the program code, the compiler or linker ensures that
only legal entry addresses satisfy this correlation.