{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:23:13Z","timestamp":1775053393385,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,21]],"date-time":"2010-09-21T00:00:00Z","timestamp":1285027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,21]]},"DOI":"10.1145\/1900546.1900550","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"7-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["E unibus pluram"],"prefix":"10.1145","author":[{"given":"Michael","family":"Franz","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"149","article-title":"On the implementation of n-version programming for software fault tolerance during execution","volume":"77","author":"Avizienis A.","year":"1977","unstructured":"A. Avizienis and L. Chen . On the implementation of n-version programming for software fault tolerance during execution . In IEEE COMPSAC 77 , pages 149 -- 155 , 1977 . A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In IEEE COMPSAC 77, pages 149--155, 1977.","journal-title":"IEEE COMPSAC"},{"key":"e_1_3_2_1_2_1","volume-title":"Mitigating buffer overflows by operating system randomization","author":"Chew M.","year":"2002","unstructured":"M. Chew and D. Song . Mitigating buffer overflows by operating system randomization . Technical Report Carnegie Mellon University-CS-02--197, Department of Computer Science, Carnegie Mellon University , Dec. 2002 . M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical Report Carnegie Mellon University-CS-02--197, Department of Computer Science, Carnegie Mellon University, Dec. 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_4_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Collberg C.","year":"2009","unstructured":"C. Collberg and J. Nagra . Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection . Addison Wesley , 2009 . C. Collberg and J. Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison Wesley, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83905"},{"key":"e_1_3_2_1_6_1","volume-title":"May 25th","author":"Fitzgerald M.","year":"2008","unstructured":"M. Fitzgerald . Cloud computing : So you don't have to stand still. New York Times , May 25th , 2008 . M. Fitzgerald. Cloud computing: So you don't have to stand still. New York Times, May 25th, 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.636672"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055626.1055632"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029623"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_3_2_1_12_1","volume-title":"ICMAS Workshop on Immunity-Based Systems","author":"Pu C.","year":"1996","unstructured":"C. Pu , A. Black , C. Cowan , and J. Walpole . A specialization toolkit to increase the diversity of operating systems . In ICMAS Workshop on Immunity-Based Systems , Nara, Japan , Dec. 1996 . C. Pu, A. Black, C. Cowan, and J. Walpole. A specialization toolkit to increase the diversity of operating systems. In ICMAS Workshop on Immunity-Based Systems, Nara, Japan, Dec. 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_3_2_1_14_1","volume-title":"2008 Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS'08)","author":"Salamat B.","year":"2008","unstructured":"B. Salamat , A. Gal , and M. Franz . Reverse stack execution in a multi-variant execution environment . In 2008 Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS'08) , June 2008 . B. Salamat, A. Gal, and M. Franz. Reverse stack execution in a multi-variant execution environment. In 2008 Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS'08), June 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2008.136"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971650"},{"key":"e_1_3_2_1_19_1","first-page":"260","volume-title":"22nd International Symposium on Reliable Distributed Systems (SRDS'03)","author":"Xu J.","year":"2003","unstructured":"J. Xu , Z. Kalbarczyk , and R. K. Iyer . Transparent runtime randomization for security . In 22nd International Symposium on Reliable Distributed Systems (SRDS'03) , pages 260 -- 269 , 2003 . J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. In 22nd International Symposium on Reliable Distributed Systems (SRDS'03), pages 260--269, 2003."}],"event":{"name":"NSPW '10: 2010 New Security Paradigms Workshop","location":"Concord Massachusetts USA","acronym":"NSPW '10","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2010 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1900546.1900550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1900546.1900550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:53Z","timestamp":1750243973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1900546.1900550"}},"subtitle":["massive-scale software diversity as a defense mechanism"],"short-title":[],"issued":{"date-parts":[[2010,9,21]]},"references-count":19,"alternative-id":["10.1145\/1900546.1900550","10.1145\/1900546"],"URL":"https:\/\/doi.org\/10.1145\/1900546.1900550","relation":{},"subject":[],"published":{"date-parts":[[2010,9,21]]},"assertion":[{"value":"2010-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}