Manipulating the attacker's view of a system's attack surface | IEEE Conference Publication | IEEE Xplore