Text this: Novel Techniques of Using Diversity in Software Security and Information Hiding

  ______     ___               _    _      _____  
 /_   _//   / _ \\      ___   | || | ||   / ___// 
   | ||    / //\ \\    /   || | || | ||   \___ \\ 
  _| ||   |  ___  ||  | [] || | \\_/ ||   /    // 
 /__//    |_||  |_||   \__ ||  \____//   /____//  
 `--`     `-`   `-`     -|_||   `---`   `-----`   
                         `-`