Neutralizing Zero-Day Exploits