A. Alarifi and W. Du, Diversify sensor nodes to improve resilience against node compromise, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.101-112, 2006.
DOI : 10.1145/1180345.1180359

S. Allier, O. Barais, B. Baudry, J. Bourcier, E. Daubert et al., Multi-tier diversification in web-based software applications, IEEE Software, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01089268

E. Paul, J. C. Ammann, and . Knight, Data diversity: an approach to software fault tolerance, IEEE Transactions on Computers, vol.37, issue.4, pp.418-425, 1988.

C. Atkinson, Component-based product line engineering with UML. Pearson Education, 2002.

A. Avizienis, The N-Version Approach to Fault-Tolerant Software, IEEE Transactions on Software Engineering, vol.11, issue.12, pp.1491-1501, 1985.
DOI : 10.1109/TSE.1985.231893

A. Avizienis, The methodology of n-version programming. Software fault tolerance, pp.23-46, 1995.

A. Avizienis, Design diversity and the immune system paradigm: Cornerstones for information system survivability, 3rd Information Survivability, 2000.

A. Avizienis, P. John, and . Kelly, Fault Tolerance by Design Diversity: Concepts and Experiments, Computer, vol.17, issue.8, pp.67-80, 1984.
DOI : 10.1109/MC.1984.1659219

S. Banescu, A. Pretschner, D. Battré, S. Cazzulani, R. Shield et al., Software-Based Protection against Changeware, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pp.231-242, 2015.
DOI : 10.1145/2699026.2699099

D. Barman, J. Chandrashekar, N. Taft, M. Faloutsos, L. Huang et al., Impact of IT monoculture on behavioral end host intrusion detection, Proceedings of the 1st ACM workshop on Research on enterprise networking, WREN '09, pp.27-36, 2009.
DOI : 10.1145/1592681.1592686

URL : https://hal.archives-ouvertes.fr/hal-00795994

E. Gabriela-barrantes, H. David, . Ackley, S. Trek, D. Palmer et al., Randomized instruction set emulation to disrupt binary code injection attacks, 2003.

B. Baudry, S. Allier, and M. Monperrus, Tailored source code transformations to synthesize computationally diverse program variants, Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, pp.149-159, 2014.
DOI : 10.1145/2610384.2610415

URL : https://hal.archives-ouvertes.fr/hal-00938855

S. Bhatkar, D. C. Duvarney, and R. Sekar, Address obfuscation: an efficient approach to combat a board range of memory error exploits, Proceedings of the USENIX Security Symposium, 2003.

S. Bhatkar, R. Sekar, C. Daniel, and . Duvarney, Efficient techniques for comprehensive protection from memory error exploits, Proceedings of the USENIX Security Symposium, pp.271-286, 2005.

P. Bishop, R. Bloomfield, I. Gashi, and V. Stankovic, Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines, 2011 IEEE 22nd International Symposium on Software Reliability Engineering, pp.11-19, 2011.
DOI : 10.1109/ISSRE.2011.15

P. Bishop, D. G. Esp, M. Barnes, P. Humphreys, G. Dahll et al., Pods ? a project on diverse software, IEEE Transactions on Software Engineering, vol.12, issue.9, pp.929-940, 1986.
DOI : 10.1109/tse.1986.6313048

J. Borello, E. Filiol, and L. Mé, From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques, Journal in Computer Virology, vol.23, issue.3, pp.277-287, 2010.
DOI : 10.1007/s11416-009-0136-2

URL : https://hal.archives-ouvertes.fr/hal-00464807

W. Stephen, A. D. Boyd, and . Keromytis, Sqlrand: Preventing sql injection attacks, Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, pp.292-302, 2004.

J. Caballero, T. Kampouris, D. Song, and J. Wang, Would diversity really increase the robustness of the routing infrastructure against software defects, NDSS, 2008.

A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè, Automatic workarounds for web applications, Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, FSE '10, pp.237-246, 2010.
DOI : 10.1145/1882291.1882327

F. Tsong-yueh-chen, . Kuo, G. Robert, T. Merkel, and . Tse, Adaptive Random Testing: The ART of test case diversity, Journal of Systems and Software, vol.83, issue.1, pp.60-66, 2010.
DOI : 10.1016/j.jss.2009.02.022

M. Chew and D. Song, Mitigating buffer overflows by operating system randomization, 2002.

D. Clarke, M. Helvensteijn, and I. Schaefer, Abstract delta modeling, ACM SIGPLAN Notices, vol.46, issue.2, pp.13-22, 2011.
DOI : 10.1145/1942788.1868298

P. Clements and L. Northrop, Software product lines: practices and patterns, 2002.

B. Frederick and . Cohen, Operating system protection through program evolution, Computers & Security, vol.12, issue.6, pp.565-584, 1993.

C. Collberg, S. Martin, J. Myers, and J. Nagra, Distributed application tamper detection via continuous software updates, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.319-328, 2012.
DOI : 10.1145/2420950.2420997

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, 1997.

C. Collberg, C. Thomborson, and D. Low, Manufacturing cheap, resilient, and stealthy opaque constructs, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.184-196, 1998.
DOI : 10.1145/268946.268962

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1946

B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu et al., N-variant systems: a secretless framework for security through diversity, Proc. of the Conf. on USENIX Security Symposium, USENIX-SS'06, 2006.

M. Aguiar, M. Baranger, E. Baptestini, Y. Kaufman, and . Bar-yam, Global patterns of speciation and diversity, Nature, vol.13, issue.7253, pp.460384-387, 2009.
DOI : 10.1038/nature08168

Y. Deswarte, K. Kanoun, and J. Laprie, Diversity against accidental and deliberate faults, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358), p.171, 1998.
DOI : 10.1109/CSDA.1998.798364

URL : https://hal.archives-ouvertes.fr/hal-00761637

E. Dave, L. D. Eckhardt, and . Lee, A theoretical basis for the analysis of multiversion software subject to coincident errors. Software Engineering, IEEE Transactions on, vol.11, issue.12, pp.1511-1517, 1985.

R. Feldt, Generating diverse software versions with genetic programming: an experimental study, Software, IEE Proceedings, pp.228-236, 1998.
DOI : 10.1049/ip-sen:19982444

R. Feldt, R. Torkar, T. Gorschek, and W. Afzal, Searching for Cognitively Diverse Tests: Towards Universal Test Diversity Metrics, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pp.178-186, 2008.
DOI : 10.1109/ICSTW.2008.36

E. Figueiredo, N. Cacho, C. Sant-'anna, M. Monteiro, U. Kulesza et al., Evolving software product lines with aspects, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.261-270, 2008.
DOI : 10.1145/1368088.1368124

S. Forrest, A. Somayaji, H. David, and . Ackley, Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), p.67, 1997.
DOI : 10.1109/HOTOS.1997.595185

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.3961

B. Foster and A. Somayaji, Object-level recombination of commodity applications, Proceedings of the 12th annual conference on Genetic and evolutionary computation, GECCO '10, pp.957-964, 2010.
DOI : 10.1145/1830483.1830653

M. Franz, E unibus pluram, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, pp.7-16, 2010.
DOI : 10.1145/1900546.1900550

M. Gabel and Z. Su, A study of the uniqueness of source code, Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, FSE '10, pp.147-156, 2010.
DOI : 10.1145/1882291.1882315

M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro, Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, pp.735-770, 2014.

I. Gashi, P. Popov, and L. Strigini, Fault diversity among off-the-shelf SQL database servers, International Conference on Dependable Systems and Networks, 2004, pp.389-398, 2004.
DOI : 10.1109/DSN.2004.1311908

I. Gashi, P. Popov, and L. Strigini, Fault Tolerance via Diversity for Off-the-Shelf Products: A Study with SQL Database Servers, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.4, pp.280-294, 2007.
DOI : 10.1109/TDSC.2007.70208

A. Gorbenko, V. Kharchenko, O. Tarasyuk, and A. Romanovsky, Using Diversity in Cloud-Based Deployment Environment to Avoid Intrusions, Proceedings of the Third International Conference on Software Engineering for Resilient Systems, pp.145-155, 2011.
DOI : 10.1007/978-3-540-39871-4_14

J. Han, D. Gao, H. Robert, and . Deng, On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.127-146, 2009.
DOI : 10.1007/11663812_3

L. Hatton, N-version design versus one good version, IEEE Software, vol.14, issue.6, pp.71-76, 1997.
DOI : 10.1109/52.636672

O. Haugen, B. Moller-pedersen, J. Oldevik, K. Gøran, A. Olsen et al., Adding Standardized Variability to Domain Specific Languages, 2008 12th International Software Product Line Conference, pp.139-148, 2008.
DOI : 10.1109/SPLC.2008.25

A. Scott, A. Hendrickson, and . Van-der-hoek, Modeling product line architectures through change sets and relationships, Proceedings of the 29th international conference on Software Engineering, pp.189-198, 2007.

M. A. Hiltunen, R. D. Schlichting, C. A. Ugarte, and G. T. Wong, Survivability through customization and adaptability: the Cactus approach, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.294-307, 2000.
DOI : 10.1109/DISCEX.2000.825033

A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, and M. Franz, Profile-guided automated software diversity, Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), 2013.
DOI : 10.1109/CGO.2013.6494997

T. Jackson, On the Design, Implications, and Effects of Implementing Software Diversity for Security

T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner et al., Compiler-Generated Software Diversity, Moving Target Defense, pp.77-98, 2011.
DOI : 10.1007/978-1-4614-0977-9_4

M. Jacob, H. Mariusz, P. Jakubowski, C. W. Naldurg, N. Saw et al., The Superdiversifier: Peephole Individualization for Software Protection, Advances in Information and Computer Security, pp.100-120, 2008.
DOI : 10.1007/978-3-540-89598-5_7

S. Jajodia, K. Anup, V. Ghosh, C. Swarup, . Wang et al., Moving Target Defense, 2011.

J. Jézéquel, Reifying configuration management for object-oriented software, Proceedings of the 20th International Conference on Software Engineering, pp.240-249, 1998.
DOI : 10.1109/ICSE.1998.671133

L. Jiang and Z. Su, Automatic mining of functionally equivalent code fragments via random testing, Proceedings of the eighteenth international symposium on Software testing and analysis, ISSTA '09, pp.81-92, 2009.
DOI : 10.1145/1572272.1572283

E. James, M. Just, and . Cornwell, Review and analysis of synthetic diversity for breaking monocultures, Proceedings of the 2004 ACM workshop on Rapid malcode, WORM '04, pp.23-32, 2004.

C. Kyo, . Kang, G. Sholom, . Cohen, A. James et al., Feature-oriented domain analysis (foda) feasibility study, 1990.

K. Kanoun, Cost of software design diversity an empirical evaluation, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443), pp.242-247, 1999.
DOI : 10.1109/ISSRE.1999.809329

S. Gaurav, A. D. Kc, V. Keromytis, and . Prevelakis, Countering code-injection attacks with instruction-set randomization, Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, pp.272-280, 2003.

P. J. John, T. I. Kelly, W. I. Mcvittie, and . Yamamoto, Implementing design diversity to achieve fault tolerance. Software, IEEE, vol.8, issue.4, pp.61-71, 1991.

A. Keromytis and V. Prevelakis, A survey of randomization techniques against common mode attacks, 2005.

J. C. Knight, J. W. Davidson, A. Evans, C. Nguyen-tuong, and . Wang, Genesis: A framework for achieving software component diversity, 2007.

C. John, N. G. Knight, and . Leveson, An experimental evaluation of the assumption of independence in multi-version programming*, IEEE Transactions on software engineering, 1986.

J. C. Knight, C. Wang, K. J. Sullivan, C. Matthew, and . Elder, Survivability architectures: issues and approaches, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, p.1157, 2000.
DOI : 10.1109/DISCEX.2000.821517

P. Koopman and J. Devale, Comparing the robustness of POSIX operating systems, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352), pp.30-37, 1999.
DOI : 10.1109/FTCS.1999.781031

P. Larsen, A. Homescu, S. Brunthaler, and M. Franz, SoK: Automated Software Diversity, 2014 IEEE Symposium on Security and Privacy, pp.276-291, 2014.
DOI : 10.1109/SP.2014.25

J. Liebig, S. Apel, C. Lengauer, C. Kästner, and M. Schulze, An analysis of the variability in forty preprocessor-based software product lines, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE '10, pp.105-114, 2010.
DOI : 10.1145/1806799.1806819

Z. Lin, D. Ryan, D. Riley, and . Xu, Polymorphing Software by Randomizing Data Structure Layout, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.107-126, 2009.
DOI : 10.1007/978-3-540-87403-4_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.4174

B. Littlewood, P. Popov, and L. Strigini, Modeling software design diversity: a review, ACM Computing Surveys, vol.33, issue.2, pp.177-208, 2001.
DOI : 10.1145/384192.384195

B. Littlewood, R. Douglas, and . Miller, Conceptual modeling of coincident failures in multiversion software. Software Engineering, IEEE Transactions on, vol.15, issue.12, pp.1596-1614, 1989.

B. Littlewood and J. Rushby, Reasoning about the Reliability of Diverse Two-Channel Systems in Which One Channel Is "Possibly Perfect", IEEE Transactions on Software Engineering, vol.38, issue.5, pp.1178-1194, 2012.
DOI : 10.1109/TSE.2011.80

X. Alex, . Liu, G. Mohamed, and . Gouda, Diverse firewall design. Parallel and Distributed Systems, IEEE Transactions on, vol.19, issue.9, pp.1237-1251, 2008.

E. Michael, S. Locasto, A. D. Sidiroglou, and . Keromytis, Software self-healing using collaborative application communities, NDSS, 2006.

N. Mavrogiannopoulos, N. Kisserli, and B. Preneel, A taxonomy of self-modifying code for obfuscation, Computers & Security, vol.30, issue.8, pp.679-691, 2011.
DOI : 10.1016/j.cose.2011.08.007

K. Shear-mccann, The diversity?stability debate, Nature, issue.6783, pp.405228-233, 2000.

J. Carlos, D. Melián, . Alonso, P. Diego, J. Vázquez et al., Frequencydependent selection predicts patterns of radiations and biodiversity, PLoS computational biology, vol.6, issue.8, 2010.

D. Mendez, B. Baudry, and M. Monperrus, Empirical evidence of large-scale diversity in API usage of object-oriented software, 2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2013.
DOI : 10.1109/SCAM.2013.6648183

URL : https://hal.archives-ouvertes.fr/hal-00844753

G. Merckxt, Software security through targeted diversification Master's thesis, Master's thesis, 2006.

B. Meyer, Object-oriented software construction, 1988.

S. Mitra, N. R. Saxena, and E. J. Mccluskey, A design diversity metric and reliability analysis for redundant systems, International Test Conference 1999. Proceedings (IEEE Cat. No.99CH37034), pp.662-671, 1999.
DOI : 10.1109/TEST.1999.805794

B. Morin, F. Fleurey, N. Bencomo, J. Jézéquel, A. Solberg et al., An Aspect-Oriented and Model-Driven Approach for Managing Dynamic Variability, Model driven engineering languages and systems, pp.782-796, 2008.
DOI : 10.1007/978-3-540-87875-9_54

URL : https://hal.archives-ouvertes.fr/inria-00468232

A. Nguyen-tuong, D. Evans, J. C. Knight, B. Cox, and J. W. Davidson, Security through redundant data diversity, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp.187-196, 2008.
DOI : 10.1109/DSN.2008.4630087

F. Victor, A. Nicola, and . Goyal, Modeling of correlated failures and community error recovery in multiversion software. Software Engineering, IEEE Transactions on, vol.16, issue.3, pp.350-359, 1990.

J. Oberheide, E. Cooke, and F. Jahanian, Cloudav: N-version antivirus in the network cloud, USENIX Security Symposium, pp.91-106, 2008.

J. Adam, H. Donnell, and . Sethu, On achieving software diversity for improved network security using distributed coloring algorithms, Proceedings of the 11th ACM Conference on Computer and Communications Security, pp.121-131, 2004.

N. Oh, S. Mitra, J. Edward, and . Mccluskey, ED/sup 4/I: error detection by diverse data and duplicated instructions, IEEE Transactions on Computers, vol.51, issue.2, pp.180-199, 2002.
DOI : 10.1109/12.980007

D. Partridge and W. Krzanowski, Software diversity: practical statistics for its measurement and exploitation. Information and software technology, pp.707-717, 1997.

K. Pohl, G. Böckle, and F. Van-der-linden, Software product line engineering: foundations, principles, and techniques, 2005.
DOI : 10.1007/3-540-28901-1

P. Popov, V. Stankovic, and L. Strigini, An Empirical Study of the Effectiveness of "Forcing" Diversity Based on a Large Population of Diverse Programs, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, pp.41-50, 2012.
DOI : 10.1109/ISSRE.2012.27

P. Popov and L. Strigini, The reliability of diverse systems: a contribution using modelling of the fault creation process, Proceedings International Conference on Dependable Systems and Networks, pp.5-14, 2001.
DOI : 10.1109/DSN.2001.941385

D. Posnett, D. Raissa, P. Souza, V. Devanbu, and . Filkov, Dual ecological measures of focus in software development, 2013 35th International Conference on Software Engineering (ICSE), pp.452-461, 2013.
DOI : 10.1109/ICSE.2013.6606591

C. Prehofer, Feature-oriented programming: A fresh look at objects, Proc. of the European Conference on Object-Oriented Programming (ECOOP), pp.419-443, 1997.
DOI : 10.1007/BFb0053389

B. Randell, System structure for software fault tolerance, 1978.

K. Salako and L. Strigini, When does "diversity" in development reduce common failures? insights from probabilistic modelling. Dependable and Secure Computing, IEEE Transactions on, issue.99, pp.1-1, 2014.

B. Salamat, A. Gal, and M. Franz, Reverse stack execution in a multi-variant execution environment, Workshop on Compiler and Architectural Techniques for Application Reliability and Security, 2008.

B. Salamat, T. Jackson, A. Gal, and M. Franz, Orchestra, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.33-46, 2009.
DOI : 10.1145/1519065.1519071

B. Salamat, T. Jackson, G. Wagner, C. Wimmer, and M. Franz, Runtime defense against code injection attacks using replicated execution. Dependable and Secure Computing, IEEE Transactions on, vol.8, issue.4, pp.588-601, 2011.
DOI : 10.1109/tdsc.2011.18

I. Schaefer, L. Bettini, V. Bono, F. Damiani, and N. Tanzarella, Delta-Oriented Programming of Software Product Lines, Software Product Lines: Going Beyond, pp.77-91, 2010.
DOI : 10.1007/978-3-642-15579-6_6

I. Schaefer, R. Rabiser, D. Clarke, L. Bettini, D. Benavides et al., Software diversity: state of the art and perspectives, International Journal on Software Tools for Technology Transfer, vol.343, issue.3, pp.477-495, 2012.
DOI : 10.1007/s10009-012-0253-y

URL : https://hal.archives-ouvertes.fr/hal-00723754

K. Schmid, R. Rabiser, and P. Grünbacher, A comparison of decision modeling approaches in product lines, Proceedings of the 5th Workshop on Variability Modeling of Software-Intensive Systems, VaMoS '11, pp.119-126, 2011.
DOI : 10.1145/1944892.1944907

E. Schulte, Z. Fry, E. Fast, W. Weimer, and S. Forrest, Software mutational robustness and proactive diversity, 2011.

S. Sidiroglou-douskos, S. Misailovic, H. Hoffmann, and M. Rinard, Managing performance vs. accuracy trade-offs with loop perforation, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.124-134, 2011.
DOI : 10.1145/2025113.2025133

E. Totel, F. Majorczyk, and L. Me, COTS Diversity Based Intrusion Detection and Application to Web Servers, Recent Advances in Intrusion Detection, pp.43-62, 2006.
DOI : 10.1007/11663812_3

URL : https://hal.archives-ouvertes.fr/hal-00356396

K. Vaidyanathan, S. Kishor, and . Trivedi, A comprehensive model for software rejuvenation. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.2, pp.124-137, 2005.

J. P. Meine, M. A. Van-der-meulen, and . Revilla, The effectiveness of software diversity in a large population of programs, IEEE Transactions on Software Engineering, vol.34, pp.753-764, 2008.

R. Van-ommering, Building product populations with software components, Proceedings of the 24th international conference on Software engineering , ICSE '02, pp.255-265, 2002.
DOI : 10.1145/581372.581373

B. Vasilescu, A. Serebrenik, M. Goeminne, and T. Mens, On the variation and specialisation of workload???A case study of the Gnome ecosystem community, Empirical Software Engineering, vol.743, issue.1, pp.1-54, 2013.
DOI : 10.1007/s10664-013-9244-1

C. Wang, J. Davidson, J. Hill, and J. C. Knight, Protection of software-based survivability mechanisms, Proc. of the Int. Conf. on Dependable Systems and Networks (DSN), pp.193-202, 2001.

R. Wang, F. Wang, T. Gregory, and . Byrd, Design and implementation of acceptance monitor for building intrusion tolerant systems. Software: Practice and Experience, pp.1399-1417, 2003.

J. Gerben and W. , Supporting diversity with component frameworks as architectural elements, Software Engineering Proceedings of the 2000 International Conference on, pp.51-60, 2000.

D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight et al., Security through Diversity: Leveraging Virtual Machine Technology, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.26-33, 2009.
DOI : 10.1109/MSP.2009.18

J. Xu, Z. Kalbarczyk, K. Ravishankar, and . Iyer, Transparent runtime randomization for security, Proceedings of the International Symposium on Reliable Distributed Systems, pp.260-269, 2003.

C. Sik, Y. , and P. H. Seong, Experimental analysis of specification language diversity impact on {NPP} software diversity, Journal of Systems and Software, vol.62, issue.2, pp.111-122, 2002.

T. Ziadi, L. Helouet, and J. Jezequel, Revisiting statechart synthesis with an algebraic approach, Proceedings. 26th International Conference on Software Engineering, pp.242-251, 2004.
DOI : 10.1109/ICSE.2004.1317446

URL : https://hal.archives-ouvertes.fr/hal-00795027