The N-version approach to fault-tolerant software, IEEE Trans. Softw. Eng, vol.11, issue.12, pp.1491-1501, 1985. ,
Efficient techniques for comprehensive protection from memory error exploits, 14th USENIX Security Symposium. USENIX Association, 2005. ,
Type analysis and data structure selection, Constructing Programs from Specifications, pp.126-164, 1991. ,
Non-control-data attacks are realistic threats, 14th USENIX Security Symposium. USENIX, 2005. ,
Operating system protection through program evolution, Computers and Security, vol.12, issue.6, pp.565-584, 1993. ,
Building diverse computer systems, 6th Workshop on Hot Topics in Operating Systems (HotOS), pp.67-72, 1997. ,
Simplifying reductions, Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on, pp.30-41, 2006. ,
Enhanced operating system security through efficient and fine-grained address space randomization, 21st USENIX Security Symposium, pp.475-490, 2012. ,
Composing transformations for instrumentation and optimization, Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation, pp.53-62, 2012. ,
A Language Theoretic Approach to Algorithms, 2000. ,
Decentralized extrema-finding in circular configurations of processors, Communications of the ACM, vol.23, issue.11, pp.627-628, 1980. ,
Librando: transparent code randomization for just-in-time compilers, ACM Conference on Computer and Communications Security, pp.993-1004, 2013. ,
Varan the unbelievable: An efficient n-version execution framework, 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'15), pp.339-353, 2015. ,
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
, Paxos made simple. SIGACT News (Distributed Computing Column), vol.32, pp.51-58, 2001.
Sok: Automated software diversity, 2014 IEEE Symposium on Security and Privacy, pp.276-291, 2014. ,
Logical clocks are not fair: What is fair? A case study of high-level language and optimization, Proceedings of the Workshop on Advanced Tools, Programming Languages, and Platforms for Implementing and Evaluating Algorithms for Distributed Systems, 2018. ,
Demand-driven incremental object queries, Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, pp.228-241, 2016. ,
A language and framework for invariant-driven transformations, Proceedings of the 8th International Conference on Generative Programming and Component Engineering, pp.55-64, 2009. ,
From recursion to iteration: what are the optimizations?, 2000 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM), 2000. ,
From Datalog rules to efficient programs with time and space guarantees, ACM Transactions on Programming Languages and Systems, vol.31, issue.6, pp.1-38, 2009. ,
Incrementalization across object abstraction, Proceedings of the 20th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp.473-486, 2005. ,
Optimizing aggregate array computations in loops, ACM Transactions on Programming Languages and Systems, vol.27, issue.1, pp.91-125, 2005. ,
From clarity to efficiency for distributed algorithms, ACM Transactions on Programming Languages and Systems, vol.39, issue.3, 2017. ,
From clarity to efficiency for distributed algorithms, Proceedings of the 27th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages and Applications, pp.395-410, 2012. ,
Systematic Program Design: From Clarity To Efficiency, 2013. ,
Finite differencing of computable expressions, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.402-454, 1982. ,
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization, 33rd IEEE Symposium on Security and Privacy, pp.601-615, 2012. ,
An optimal algorithm for mutual exclusion in computer networks, Communications of the ACM, vol.24, issue.1, pp.9-17, 1981. ,
Revisiting browser security in the modern era: New data-only attacks and defenses, 2017 IEEE European Symposium on Security and Privacy, pp.366-381, 2017. ,
Winnowing: Local algorithms for document fingerprinting, 2003 ACM SIGMOD International Conference on Management of Data, pp.76-85, 2003. ,
INSeRT: Protect dynamic code generation against spraying, International Conference on Information Science and Technology, pp.323-328, 2011. ,
Bunshin: Compositing security mechanisms through diversification, USENIX Annual Technical Conference, pp.271-283, 2017. ,