Text this: Novel Techniques of Using Diversity in Software Security and Information Hiding

  ______    _____    __   _      ___      _  _   
 /_____//  |  ___|| | || | ||   / _ \\   | \| || 
 `____ `   | ||__   | '--' ||  / //\ \\  |  ' || 
 /___//    | ||__   | .--. || |  ___  || | .  || 
 `__ `     |_____|| |_|| |_|| |_||  |_|| |_|\_|| 
 /_//      `-----`  `-`  `-`  `-`   `-`  `-` -`  
 `-`