Self Destructing Exploit Executions via Input Perturbation