{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:43:28Z","timestamp":1725507808700},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/dsn.2010.5545012","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T16:44:07Z","timestamp":1281458647000},"page":"71-80","source":"Crossref","is-referenced-by-count":1,"title":["Diverse Partial Memory Replication"],"prefix":"10.1109","author":[{"given":"Ryan M.","family":"Lefever","sequence":"first","affiliation":[]},{"given":"Vikram S.","family":"Adve","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"105","article-title":"N-variant systems: A secretless framework for security through diversity","author":"cox","year":"2006","journal-title":"Proc 15th Annu USENIX Security Symp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133999"},{"key":"ref12","first-page":"125","article-title":"Purify: Fast detection of memory leaks and access errors","author":"hastings","year":"1992","journal-title":"Proc USENIX Winter Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"journal-title":"Software errors cost U S economy $59 5 billion annually NIST assesses technical needs of industry to improve software-testing","year":"2002","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250736"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352616"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1997.614078"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029913"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178446"},{"key":"ref6","first-page":"105","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","author":"bhatkar","year":"2003","journal-title":"12th USENIX Security Symp"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1502528"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859718"},{"journal-title":"SPEC CPU2000","year":"2009","key":"ref2"},{"journal-title":"The Llvm Compiler Infrastructure","year":"2009","key":"ref1"},{"key":"ref9","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"chen","year":"1978","journal-title":"Proc Int Symp Fault-Tolerant Comput"},{"key":"ref20","first-page":"1","article-title":"The evolution of the recovery block concept","author":"randell","year":"1995","journal-title":"Software Fault Tolerance"},{"key":"ref22","article-title":"Making smart investments to reduce unplanned downtime","author":"scott","year":"1999","journal-title":"Tactical Guidelines TG-07-4033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"ref24","first-page":"38","article-title":"PREACHES - Portable recovery and checkpointing in heterogeneous systems","author":"ssu","year":"1998","journal-title":"Proc Int Symp Fault-Tolerant Comput"},{"key":"ref23","first-page":"17","article-title":"Using Valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"Proc 2005 Ann USENIX Technical Conf"},{"key":"ref26","first-page":"260","article-title":"Transparent runtime randomization for security","author":"xu","year":"2003","journal-title":"Proc 22nd IEEE Symp Reliable Distributed Systems"},{"key":"ref25","first-page":"127","article-title":"Community error recovery in N-version software: A design study with experimentation","author":"tso","year":"1987","journal-title":"Proc Int Symp Fault-Tolerant Comput"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2010,6,28]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532324\/5544245\/05545012.pdf?arnumber=5545012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:33:00Z","timestamp":1489887180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5545012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dsn.2010.5545012","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}