1. A.AvizienisandL.Chen.On the implementation of n‐version programming for software fault tolerance during execution. InProceedings of the IEEE International Computer Software and Applications Conference pages149–155 1977.
2. E. D.BergerandB. G.Zorn.Diehard: probabilistic memory safety for unsafe languages. InProceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation pages158–168 2006.
3. S.Bhatkar D. C.DuVarney andR.Sekar.Address obfuscation: an efficient approach to combat a board range of memory error exploits. InProceedings of the 12th conference onUSENIXSecurity Symposium ‐ Volume 12 SSYM'03 pages 8–8 Berkeley CA USA 2003. USENIX Association.
4. M.CastroandB.Liskov.Authenticated byzantine fault tolerance without public‐key cryptography. Technical Report Technical Memo MIT/LCS/TM‐589 MIT Laboratory for Computer Science 1999.
5. M.CastroandB.Liskov.Practical byzantine fault tolerance. InProceedings of the third symposium on Operating systems design and implementation OSDI'99 pages 173–186 Berkeley CA USA 1999. USENIX Association.