This book is a highly technical, mathematically as well as technologically speaking, work aiming at solving some of main contemporary cyber security challenges. Executables, assembly code, or ,similarly, dalvik, obfuscated bytecode are now everywhere in devices, information systems, smartphones. Intellectual property (processing or communications) and access control systems largely consist of software systems made of such wild, hard to control, hacker measuring (yet useful!) data. Think about your privacy in a bottom-up way, for database access might need executables to be made secure, too. High cost multicore microprocessor will be needed, yet this shall be revelations to security.