Experiments with deceptive software responses to buffer-overflow attacks | IEEE Conference Publication | IEEE Xplore