Using graphic turing tests to counter automated DDoS attacks against web servers
Randomized instruction set emulation to disrupt binary code injection attacks
Countering code-injection attacks with instruction-set randomization
Obfuscation of executable code to improve resistance to static disassembly