Successful cyber-attacks against critical systems are becoming more common. Most solutions focus on achieving resiliency and survivability, allowing software to continue working in a degraded or compromised state after a cyber-attack. However, specific mission requirements for some critical cyber systems make it preferable for the mission software to fail or crash as quickly as possible after a successful cyber-attack. To achieve this objective, IAI will develop the Binary code Randomization for Attack Sensitive Software (BRASS). The key innovation is developing an architecture that offers transparent and automatic binary code diversification to guarantee that a generated binary software variance would crash quickly and consistently after faults introduced from a Return Oriented Programming (ROP) attack. BRASS will automatically apply novel binary code randomization and transformation techniques to achieve this “fast-crash” property for prompt software termination when faced with successful ROP-based exploitation attacks. BRASS works in two phases: a static phase that forms a randomized target binary; and a load-time phase that randomizes the binary by reordering its instructions each time it starts. BRASS will not require source code, and will be compatible with existing or legacy software. It provides a proof of functional equivalence for all software variants generated using BRASS’ binary transformation method. Each generated variant maintains the same level of robustness as the original program under normal conditions. BRASS provides the level of diversification sufficient to guarantee such that the attack that succeeded in a single variant will crash in other variants.