{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:59:37Z","timestamp":1769828377011,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PTDC\/EEI-SCR\/1741\/2041, UID\/CEC\/00408\/2019, SFRH\/BD\/84375\/201"],"award-info":[{"award-number":["PTDC\/EEI-SCR\/1741\/2041, UID\/CEC\/00408\/2019, SFRH\/BD\/84375\/201"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["700692"],"award-info":[{"award-number":["700692"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3361525.3361550","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"241-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Lazarus"],"prefix":"10.1145","author":[{"given":"Miguel","family":"Garcia","sequence":"first","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa, Portugal"}]},{"given":"Alysson","family":"Bessani","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa, Portugal"}]},{"given":"Nuno","family":"Neves","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2630069"},{"key":"e_1_3_2_1_2_1","unstructured":"F. Alves A. Bettini P. M. Ferreira and A. Bessani. 2019. Processing Tweets for Cybersecurity Threat Awareness. CoRR abs\/1904.02072 (April 2019). http:\/\/arxiv.org\/abs\/1904.02072  F. Alves A. Bettini P. M. Ferreira and A. Bessani. 2019. Processing Tweets for Cybersecurity Threat Awareness. CoRR abs\/1904.02072 (April 2019). http:\/\/arxiv.org\/abs\/1904.02072"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2019. Amazon Managed Blockchain. https:\/\/aws.amazon.com\/managed-blockchain\/.  Amazon. 2019. Amazon Managed Blockchain. https:\/\/aws.amazon.com\/managed-blockchain\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.70"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the ACM European Conference on Computer Systems.","author":"Androulaki E.","unstructured":"E. Androulaki , A. Barger , V. Bortnikov , C. Cachin , K. Christidis , A. De Caro , D. Enyeart , C. Ferris , G. Laventman , Y. Manevich , S. Muralidharan , C. Murthy , B. Nguyen , M. Sethi , G. Singh , K. Smith , A. Sorniotti , C. Stathakopoulou , M. Vukoli\u0107 , S. Cocco , and J. Yellick . 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains . In Proceedings of the ACM European Conference on Computer Systems. E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukoli\u0107, S. Cocco, and J. Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the ACM European Conference on Computer Systems."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Annual International Computer Software and Applications Conference.","author":"Avizienis A.","unstructured":"A. Avizienis and L. Chen . 1977. On the Implementation of N-Version Programming for Software Fault Tolerance During Execution . In Proceedings of the Annual International Computer Software and Applications Conference. A. Avizienis and L. Chen. 1977. On the Implementation of N-Version Programming for Software Fault Tolerance During Execution. In Proceedings of the Annual International Computer Software and Applications Conference."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_9_1","unstructured":"B. Brenner. 2017. Stack Clash Linux vulnerability: you need to patch now. https:\/\/nakedsecurity.sophos.com\/2017\/06\/20\/stack-clash-linux-vulnerability-you-need-to-patch-now\/.  B. Brenner. 2017. Stack Clash Linux vulnerability: you need to patch now. https:\/\/nakedsecurity.sophos.com\/2017\/06\/20\/stack-clash-linux-vulnerability-you-need-to-patch-now\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of USENIX Annual Technical Conference.","author":"Bairavasundaram L.","unstructured":"L. Bairavasundaram , S. Sundararaman , A. Arpaci-Dusseau , and R. Arpaci-Dusseau . 2009. Tolerating File-system Mistakes with EnvyFS . In Proceedings of USENIX Annual Technical Conference. L. Bairavasundaram, S. Sundararaman, A. Arpaci-Dusseau, and R. Arpaci-Dusseau. 2009. Tolerating File-system Mistakes with EnvyFS. In Proceedings of USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware.","author":"Behl J.","unstructured":"J. Behl , T. Distler , and R. Kapitza . 2015. Consensus-Oriented Parallelization: How to Earn Your First Million . In Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware. J. Behl, T. Distler, and R. Kapitza. 2015. Consensus-Oriented Parallelization: How to Earn Your First Million. In Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the ACM European Conference on Computer Systems.","author":"Behl J.","unstructured":"J. Behl , T. Distler , and R. Kapitza . 2017. Hybrids on Steroids: SGX-Based High Performance BFT . In Proceedings of the ACM European Conference on Computer Systems. J. Behl, T. Distler, and R. Kapitza. 2017. Hybrids on Steroids: SGX-Based High Performance BFT. In Proceedings of the ACM European Conference on Computer Systems."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the IEEE Symposium on Reliable Distributed Systems.","author":"Berger C.","unstructured":"C. Berger , H. P. Reiser , J. Sousa , and A. Bessani . 2019. Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication . In Proceedings of the IEEE Symposium on Reliable Distributed Systems. C. Berger, H. P. Reiser, J. Sousa, and A. Bessani. 2019. Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication. In Proceedings of the IEEE Symposium on Reliable Distributed Systems."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Bessani A.","unstructured":"A. Bessani , M. Santos , J. F\u00e9lix , N. Neves , and M. Correia . 2013. On the Efficiency of Durable State Machine Replication . In Proceedings of the USENIX Annual Technical Conference. A. Bessani, M. Santos, J. F\u00e9lix, N. Neves, and M. Correia. 2013. On the Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"Bessani A.","unstructured":"A. Bessani , J. Sousa , and E. Alchieri . 2014. State Machine Replication for the Masses with BFT-SMaRt . In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks. A. Bessani, J. Sousa, and E. Alchieri. 2014. State Machine Replication for the Masses with BFT-SMaRt. In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134022"},{"key":"e_1_3_2_1_17_1","volume-title":"Hacking Blind. In Proceedings of the IEEE Symposium on Security and Privacy.","author":"Bittau A.","unstructured":"A. Bittau , A. Belay , A. Mashtizadeh , D. Mazi\u00e8res , and D. Boneh . 2014 . Hacking Blind. In Proceedings of the IEEE Symposium on Security and Privacy. A. Bittau, A. Belay, A. Mashtizadeh, D. Mazi\u00e8res, and D. Boneh. 2014. Hacking Blind. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining.","author":"Bozorgi M.","unstructured":"M. Bozorgi , L. Saul , S. Savage , and G. Voelker . 2010. Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits . In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining. M. Bozorgi, L. Saul, S. Savage, and G. Voelker. 2010. Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation.","author":"Castro M.","unstructured":"M. Castro and B. Liskov . 1999. Practical Byzantine Fault Tolerance . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. M. Castro and B. Liskov. 1999. Practical Byzantine Fault Tolerance. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859718"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the IEEE Symposium on Fault-Tolerant Computing.","author":"Chen L.","year":"1978","unstructured":"L. Chen and Algirdas Avizienis . 1978 . N-version Programming: A Fault-Tolerance Approach to Reliability of Software Operation . In Proceedings of the IEEE Symposium on Fault-Tolerant Computing. L. Chen and Algirdas Avizienis. 1978. N-version Programming: A Fault-Tolerance Approach to Reliability of Software Operation. In Proceedings of the IEEE Symposium on Fault-Tolerant Computing."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the USENIX Symposium on Networked Design and Implementation.","author":"Clement A.","unstructured":"A. Clement , E. Wong , L. Alvisi , M. Dahlin , and M. Marchetti . 2009. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults . In Proceedings of the USENIX Symposium on Networked Design and Implementation. A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. 2009. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. In Proceedings of the USENIX Symposium on Networked Design and Implementation."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the ACM Symposium on Cloud Computing.","author":"Cooper B.","unstructured":"B. Cooper , A. Silberstein , E. Tam , R. Ramakrishnan , and R. Sears . 2010. Benchmarking Cloud Serving Systems with YCSB . In Proceedings of the ACM Symposium on Cloud Computing. B. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears. 2010. Benchmarking Cloud Serving Systems with YCSB. In Proceedings of the ACM Symposium on Cloud Computing."},{"key":"e_1_3_2_1_25_1","unstructured":"CVSSv3. 2019. Common Vulnerability Scoring System. https:\/\/www.first.org\/cvss\/specification-document.  CVSSv3. 2019. Common Vulnerability Scoring System. https:\/\/www.first.org\/cvss\/specification-document."},{"key":"e_1_3_2_1_26_1","unstructured":"Debian. 2018. Debian Security Tracker. https:\/\/security-tracker.debian.org\/tracker\/.  Debian. 2018. Debian Security Tracker. https:\/\/security-tracker.debian.org\/tracker\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions.","author":"Deswarte Y.","unstructured":"Y. Deswarte , K. Kanoun , and J. Laprie . 1998. Diversity Against Accidental and Deliberate Faults . In Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions. Y. Deswarte, K. Kanoun, and J. Laprie. 1998. Diversity Against Accidental and Deliberate Faults. In Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Distler T.","unstructured":"T. Distler , R. Kapitza , I. Popov , H. Reiser , and W. Schr\u00f6der-Preikschat . 2011. SPARE: Replicas on Hold . In Proceedings of the Network and Distributed System Security Symposium. T. Distler, R. Kapitza, I. Popov, H. Reiser, and W. Schr\u00f6der-Preikschat. 2011. SPARE: Replicas on Hold. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 3rd IFIP Conference on Computer Security.","author":"Fraga J. S.","unstructured":"J. S. Fraga and D. Powell . 1985. A Fault- and Intrusion-tolerant File System . In Proceedings of the 3rd IFIP Conference on Computer Security. J. S. Fraga and D. Powell. 1985. A Fault- and Intrusion-tolerant File System. In Proceedings of the 3rd IFIP Conference on Computer Security."},{"key":"e_1_3_2_1_30_1","unstructured":"FreeBSD. 2019. FreeBSD Advisories. https:\/\/www.freebsd.org\/security\/advisories.html.  FreeBSD. 2019. FreeBSD Advisories. https:\/\/www.freebsd.org\/security\/advisories.html."},{"key":"e_1_3_2_1_31_1","unstructured":"B. Freeman. 2015. A New Defense for Navy Ships: Protection from Cyber Attacks. https:\/\/www.onr.navy.mil\/en\/Media-Center\/PressReleases\/2015\/RHIMES-Cyber-Attack-Protection.aspx.  B. Freeman. 2015. A New Defense for Navy Ships: Protection from Cyber Attacks. https:\/\/www.onr.navy.mil\/en\/Media-Center\/PressReleases\/2015\/RHIMES-Cyber-Attack-Protection.aspx."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the SIGCOMM Workshop on Large-scale Attack Defense.","author":"Frei S.","unstructured":"S. Frei , M. May , U. Fiedler , and B. Plattner . 2006. Large-scale Vulnerability Analysis . In Proceedings of the SIGCOMM Workshop on Large-scale Attack Defense. S. Frei, M. May, U. Fiedler, and B. Plattner. 2006. Large-scale Vulnerability Analysis. In Proceedings of the SIGCOMM Workshop on Large-scale Attack Defense."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"Garcia M.","unstructured":"M. Garcia , A. Bessani , I. Gashi , N. Neves , and R. Obelheiro . 2011. OS Diversity for Intrusion Tolerance: Myth or Reality? . In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks. M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro. 2011. OS Diversity for Intrusion Tolerance: Myth or Reality?. In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_34_1","first-page":"6","article-title":"Analysis of Operating System Diversity for Intrusion Tolerance. Software","volume":"44","author":"Garcia M.","year":"2014","unstructured":"M. Garcia , A. Bessani , I. Gashi , N. Neves , and R. Obelheiro . 2014 . Analysis of Operating System Diversity for Intrusion Tolerance. Software : Practice and Experience 44 , 6 (June 2014), 735--770. M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro. 2014. Analysis of Operating System Diversity for Intrusion Tolerance. Software: Practice and Experience 44, 6 (June 2014), 735--770.","journal-title":"Practice and Experience"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593442"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70208"},{"key":"e_1_3_2_1_37_1","unstructured":"HashiCorp. 2019. Vagrant. https:\/\/www.vagrantup.com\/.  HashiCorp. 2019. Vagrant. https:\/\/www.vagrantup.com\/."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the ACM Symposium on Operating Systems Principles.","author":"Hawblitzel C.","unstructured":"C. Hawblitzel , J. Howell , M. Kapritsos , J. Lorch , B. Parno , M. Roberts , S. Setty , and B. Zill . 2015. IronFleet: Proving Practical Distributed Systems Correct . In Proceedings of the ACM Symposium on Operating Systems Principles. C. Hawblitzel, J. Howell, M. Kapritsos, J. Lorch, B. Parno, M. Roberts, S. Setty, and B. Zill. 2015. IronFleet: Proving Practical Distributed Systems Correct. In Proceedings of the ACM Symposium on Operating Systems Principles."},{"key":"e_1_3_2_1_39_1","unstructured":"IBM. 2019. IBM Blockchain. https:\/\/www.ibm.com\/blockchain\/platform.  IBM. 2019. IBM Blockchain. https:\/\/www.ibm.com\/blockchain\/platform."},{"key":"e_1_3_2_1_40_1","unstructured":"J. Pearson. 2018. A Major Bug In Bitcoin Software Could Have Crashed the Currency. https:\/\/motherboard.vice.com\/amp\/enus\/article\/qvakp3\/a-major-bug-in-bitcoin-software-could-have-crashed-the-currency?.  J. Pearson. 2018. A Major Bug In Bitcoin Software Could Have Crashed the Currency. https:\/\/motherboard.vice.com\/amp\/enus\/article\/qvakp3\/a-major-bug-in-bitcoin-software-could-have-crashed-the-currency?."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of USENIX Annual Technical Conference.","author":"Junqueira F.","unstructured":"F. Junqueira , R. Bhagwan , A. Hevia , K. Marzullo , and G. Voelker . 2005. Surviving Internet Catastrophes . In Proceedings of USENIX Annual Technical Conference. F. Junqueira, R. Bhagwan, A. Hevia, K. Marzullo, and G. Voelker. 2005. Surviving Internet Catastrophes. In Proceedings of USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_43_1","unstructured":"L. Kessem. 2017. WannaCry Ransomware Spreads Across the Globe Makes Organizations Wanna Cry About Microsoft Vulnerability. https:\/\/securityintelligence.com\/wannacry-ransomware-spreads-across-the-globe-makes-organizations-wanna-cry-about-microsoft-vulnerability\/.  L. Kessem. 2017. WannaCry Ransomware Spreads Across the Globe Makes Organizations Wanna Cry About Microsoft Vulnerability. https:\/\/securityintelligence.com\/wannacry-ransomware-spreads-across-the-globe-makes-organizations-wanna-cry-about-microsoft-vulnerability\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2269541"},{"key":"e_1_3_2_1_45_1","first-page":"4","article-title":"Zyzzyva: Speculative Byzantine Fault Tolerance","volume":"27","author":"Kotla R.","year":"2010","unstructured":"R. Kotla , L. Alvisi , M. Dahlin , A. Clement , and E. Wong . 2010 . Zyzzyva: Speculative Byzantine Fault Tolerance . ACM Transactions on Computer Systems 27 , 4 (Jan. 2010), 1--39. R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. 2010. Zyzzyva: Speculative Byzantine Fault Tolerance. ACM Transactions on Computer Systems 27, 4 (Jan. 2010), 1--39.","journal-title":"ACM Transactions on Computer Systems"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems.","author":"Lee H.","unstructured":"H. Lee , J. Seibert , E. Hoque , C. Killian , and C. Nita-Rotaru . 2014. Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations . In Proceedings of the IEEE International Conference on Distributed Computing Systems. H. Lee, J. Seibert, E. Hoque, C. Killian, and C. Nita-Rotaru. 2014. Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. In Proceedings of the IEEE International Conference on Distributed Computing Systems."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation.","author":"Liu S.","unstructured":"S. Liu , P. Viotti , C. Cachin , V. Quema , and M. Vukolic . 2016. XFT: Practical Fault Tolerance Beyond Crashes . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. S. Liu, P. Viotti, C. Cachin, V. Quema, and M. Vukolic. 2016. XFT: Practical Fault Tolerance Beyond Crashes. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Liu Y.","unstructured":"Y. Liu , Armin Sarabi , Jing Zhang , P. Naghizadeh , M. Karir , M. Bailey , and M. Liu . 2015. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents . In Proceedings of the USENIX Security Symposium. Y. Liu, Armin Sarabi, Jing Zhang, P. Naghizadeh, M. Karir, M. Bailey, and M. Liu. 2015. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware.","author":"Martins R.","unstructured":"R. Martins , R. Gandhi , P. Narasimhan , S. Pertet , A. Casimiro , D. Kreutz , and P. Ver\u00edssimo . 2013. Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol . In Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware. R. Martins, R. Gandhi, P. Narasimhan, S. Pertet, A. Casimiro, D. Kreutz, and P. Ver\u00edssimo. 2013. Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol. In Proceedings of the ACM\/IFIP\/USENIX International Conference on Middleware."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the International Workshop on Security Measurements and Metrics.","author":"Massacci F.","unstructured":"F. Massacci and V. Nguyen . 2010. Which is the Right Source for Vulnerability Studies? An Empirical Analysis on Mozilla Firefox . In Proceedings of the International Workshop on Security Measurements and Metrics. F. Massacci and V. Nguyen. 2010. Which is the Right Source for Vulnerability Studies? An Empirical Analysis on Mozilla Firefox. In Proceedings of the International Workshop on Security Measurements and Metrics."},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft. 2017. Microsoft Security Advisories and Bulletins. https:\/\/technet.microsoft.com\/en-us\/library\/security\/.  Microsoft. 2017. Microsoft Security Advisories and Bulletins. https:\/\/technet.microsoft.com\/en-us\/library\/security\/."},{"key":"e_1_3_2_1_52_1","unstructured":"Mitre. 2019. Common Platform Enumeration. http:\/\/cpe.mitre.org\/.  Mitre. 2019. Common Platform Enumeration. http:\/\/cpe.mitre.org\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Mitre. 2019. CVE Terminology. http:\/\/cve.mitre.org\/about\/terminology.html.  Mitre. 2019. CVE Terminology. http:\/\/cve.mitre.org\/about\/terminology.html."},{"key":"e_1_3_2_1_54_1","unstructured":"National Institute of Standards and Technology. 2019. National Vulnerability Database. http:\/\/nvd.nist.gov\/.  National Institute of Standards and Technology. 2019. National Vulnerability Database. http:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_55_1","unstructured":"Oracle. 2019. Map of CVE to Advisory\/Alert. https:\/\/www.oracle.com\/technetwork\/topics\/security\/public-vuln-to-advisory-mapping-093627.html.  Oracle. 2019. Map of CVE to Advisory\/Alert. https:\/\/www.oracle.com\/technetwork\/topics\/security\/public-vuln-to-advisory-mapping-093627.html."},{"key":"e_1_3_2_1_56_1","unstructured":"D. Palmer. 2017. Petya ransomware attack: What it is and why this is happening again. https:\/\/www.zdnet.com\/article\/petya-ransomware-attack-what-it-is-and-why-this-is-happening-again\/.  D. Palmer. 2017. Petya ransomware attack: What it is and why this is happening again. https:\/\/www.zdnet.com\/article\/petya-ransomware-attack-what-it-is-and-why-this-is-happening-again\/."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the IEEE Symposium on Reliable Distributed Systems.","author":"Platania M.","unstructured":"M. Platania , D. Obenshain , T. Tantillo , R. Sharma , and Y. Amir . 2014. Towards a Practical Survivable Intrusion Tolerant Replication System . In Proceedings of the IEEE Symposium on Reliable Distributed Systems. M. Platania, D. Obenshain, T. Tantillo, R. Sharma, and Y. Amir. 2014. Towards a Practical Survivable Intrusion Tolerant Replication System. In Proceedings of the IEEE Symposium on Reliable Distributed Systems."},{"key":"e_1_3_2_1_58_1","unstructured":"Puppet. 2019. How Razor Works. https:\/\/puppet.com\/docs\/pe\/2019.1\/howrazorworks.html.  Puppet. 2019. How Razor Works. https:\/\/puppet.com\/docs\/pe\/2019.1\/howrazorworks.html."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the European Symposium on Programming.","author":"Rahli V.","unstructured":"V. Rahli , I. Vukotic , M. Volp , and P. Ver\u00edssimo . 2018. Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq . In Proceedings of the European Symposium on Programming. V. Rahli, I. Vukotic, M. Volp, and P. Ver\u00edssimo. 2018. Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. In Proceedings of the European Symposium on Programming."},{"key":"e_1_3_2_1_60_1","unstructured":"RedHat. 2019. RedHat CVE Database. https:\/\/access.redhat.com\/security\/cve\/.  RedHat. 2019. RedHat CVE Database. https:\/\/access.redhat.com\/security\/cve\/."},{"key":"e_1_3_2_1_61_1","unstructured":"Machine Learning Group at the University of Waikato. 2019. WEKA. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/.  Machine Learning Group at the University of Waikato. 2019. WEKA. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/."},{"key":"e_1_3_2_1_62_1","unstructured":"Oracle. 2019. VirtualBox. https:\/\/www.virtualbox.org\/.  Oracle. 2019. VirtualBox. https:\/\/www.virtualbox.org\/."},{"key":"e_1_3_2_1_63_1","unstructured":"CVE Details. 2019. The Ultimate Security Vulnerability Datasource. http:\/\/www.cvedetails.com\/.  CVE Details. 2019. The Ultimate Security Vulnerability Datasource. http:\/\/www.cvedetails.com\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Exploit Database. 2019. Offensive Security\u00e2\u0102&Zacute;s Exploit Database Archive. https:\/\/www.exploit-db.com\/.  Exploit Database. 2019. Offensive Security\u00e2\u0102&Zacute;s Exploit Database Archive. https:\/\/www.exploit-db.com\/."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1813654.1813655"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Sabottke C.","unstructured":"C. Sabottke , O. Suciu , and T. Dumitras . 2015. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits . In Proceedings of the USENIX Security Symposium. C. Sabottke, O. Suciu, and T. Dumitras. 2015. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Snow K.","unstructured":"K. Snow , F. Monrose , L. Davi , A. Dmitrienko , C. Liebchen , and A. Sadeghi . 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization . In Proceedings of the IEEE Symposium on Security and Privacy. K. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A. Sadeghi. 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the IEEE Symposium on Reliable Distributed Systems.","author":"Sousa J.","unstructured":"J. Sousa and A. Bessani . 2015. Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines . In Proceedings of the IEEE Symposium on Reliable Distributed Systems. J. Sousa and A. Bessani. 2015. Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines. In Proceedings of the IEEE Symposium on Reliable Distributed Systems."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"Sousa J.","unstructured":"J. Sousa , A. Bessani , and M. Vukoli\u0107 . 2018. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform . In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks. J. Sousa, A. Bessani, and M. Vukoli\u0107. 2018. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the Workshop on Hot Topics in System Dependability.","author":"Sousa P.","unstructured":"P. Sousa , N. Neves , and P. Ver\u00edssimo . 2007. Hidden Problems of Asynchronous Proactive Recovery . In Proceedings of the Workshop on Hot Topics in System Dependability. P. Sousa, N. Neves, and P. Ver\u00edssimo. 2007. Hidden Problems of Asynchronous Proactive Recovery. In Proceedings of the Workshop on Hot Topics in System Dependability."},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Syta E.","unstructured":"E. Syta , P. Jovanovic , E. Kogias , N. Gailly , L. Gasser , I. Khoffi , M. Fischer , and B. Ford . 2017. Scalable Bias-Resistant Distributed Randomness . In Proceedings of the IEEE Symposium on Security and Privacy. E. Syta, P. Jovanovic, E. Kogias, N. Gailly, L. Gasser, I. Khoffi, M. Fischer, and B. Ford. 2017. Scalable Bias-Resistant Distributed Randomness. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289263"},{"key":"e_1_3_2_1_74_1","unstructured":"Ubuntu. 2019. Ubuntu Security Notices. https:\/\/usn.ubuntu.com\/usn\/.  Ubuntu. 2019. Ubuntu Security Notices. https:\/\/usn.ubuntu.com\/usn\/."},{"key":"e_1_3_2_1_75_1","first-page":"3","article-title":"Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems. Springer","volume":"1","author":"Ver\u00edssimo P.","year":"2003","unstructured":"P. Ver\u00edssimo , N. Neves , and M. Correia . 2003 . Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems. Springer , Chapter 1 , 3 -- 36 . P. Ver\u00edssimo, N. Neves, and M. Correia. 2003. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems. Springer, Chapter 1, 3--36.","journal-title":"Chapter"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation.","author":"Williams-King D.","unstructured":"D. Williams-King , G. Gobieski , K. Williams-King , J. Blake , X. Yuan , P. Colp , M. Zheng , V. Kemerlis , J. Yang , and W. Aiello . 2016. Shuffler: Fast and Deployable Continuous Code Re-randomization . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. D. Williams-King, G. Gobieski, K. Williams-King, J. Blake, X. Yuan, P. Colp, M. Zheng, V. Kemerlis, J. Yang, and W. Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-randomization. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Xiao C.","unstructured":"C. Xiao , A. Sarabi , Y. Liu , B. Li , M. Liu , and T. Dumitras . 2018. From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild . In Proceedings of the USENIX Security Symposium. C. Xiao, A. Sarabi, Y. Liu, B. Li, M. Liu, and T. Dumitras. 2018. From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Xue H.","unstructured":"H. Xue , N. Dautenhahn , and S. King . 2012. Using Replicated Execution for a More Secure and Reliable Web Browser . In Proceedings of the Network and Distributed System Security Symposium. H. Xue, N. Dautenhahn, and S. King. 2012. Using Replicated Execution for a More Secure and Reliable Web Browser. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8157-6_19"}],"event":{"name":"Middleware '19: 20th International Middleware Conference","location":"Davis CA USA","acronym":"Middleware '19","sponsor":["ACM Association for Computing Machinery","IFIP"]},"container-title":["Proceedings of the 20th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361525.3361550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361525.3361550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:26Z","timestamp":1750268966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361525.3361550"}},"subtitle":["Automatic Management of Diversity in BFT Systems"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":80,"alternative-id":["10.1145\/3361525.3361550","10.1145\/3361525"],"URL":"https:\/\/doi.org\/10.1145\/3361525.3361550","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}