Prove It or Lose It: Using Attack Path Validation for Proactive Security