26
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Runtime Defense against Code Injection Attacks Using Replicated Execution

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references23

          • Record: found
          • Abstract: not found
          • Article: not found

          The N-Version Approach to Fault-Tolerant Software

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An experimental evaluation of the assumption of independence in multiversion programming

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Flicker

                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Dependable and Secure Computing
                IEEE Trans. Dependable and Secure Comput.
                Institute of Electrical and Electronics Engineers (IEEE)
                1545-5971
                July 2011
                July 2011
                : 8
                : 4
                : 588-601
                Article
                10.1109/TDSC.2011.18
                fa9f14a7-3664-4243-851e-1ff2af2e4585
                © 2011
                History

                Comments

                Comment on this article