Motivation
The attackers can inject instructions to the executables.
Definition
Instead of executing the executable directly, we add randomizations to the executable, and de-randomize when execute.
Randomization
- XOR
- Use a key to XOR with the instruction, and XOR again when execute
Reference
[1] https://www.youtube.com/watch?v=ZgNBjwXTrqA