B. Baudry, S. Allier, and M. Monperrus, Tailored source code transformations to synthesize computationally diverse program variants, Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, 2014.
DOI : 10.1145/2610384.2610415

URL : https://hal.archives-ouvertes.fr/hal-00938855

W. Stephen, A. D. Boyd, and . Keromytis, Sqlrand: Preventing sql injection attacks, Proceedings of the Applied Cryptography and Network Security Conference, pp.292-302, 2004.

B. Frederick and . Cohen, Operating system protection through program evolution, Computers & Security, vol.12, issue.6, pp.565-584, 1993.

N. Ferry, A. Rossini, F. Chauvel, B. Morin, and A. Solberg, Towards Model-Driven Provisioning, Deployment, Monitoring, and Adaptation of Multi-cloud Systems, 2013 IEEE Sixth International Conference on Cloud Computing, pp.887-894, 2013.
DOI : 10.1109/CLOUD.2013.133

S. Forrest, A. Somayaji, H. David, and . Ackley, Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), pp.67-72, 1997.
DOI : 10.1109/HOTOS.1997.595185

L. Goldrich and C. E. Landwehr, Moving Target [Guest editors' introduction], IEEE Security & Privacy, vol.12, issue.2, pp.14-15, 2014.
DOI : 10.1109/MSP.2014.29

S. Misailovic, S. Sidiroglou, H. Hoffmann, and M. Rinard, Quality of service profiling, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE '10, pp.25-34, 2010.
DOI : 10.1145/1806799.1806808

H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein, Finding Focus in the Blur of Moving-Target Techniques, IEEE Security & Privacy, vol.12, issue.2, pp.16-26, 2014.
DOI : 10.1109/MSP.2013.137

P. David-lorge, Which is riskier: OS diversity or OS monopoly?, Communications of the ACM, vol.50, issue.8, p.112, 2007.

M. Stamp, Risks of monoculture, Communications of the ACM, vol.47, issue.3, p.120, 2004.
DOI : 10.1145/971617.971650

W. Weimer, T. Nguyen, C. L. Goues, and S. Forrest, Automatically finding patches using genetic programming, 2009 IEEE 31st International Conference on Software Engineering, pp.364-374, 2009.
DOI : 10.1109/ICSE.2009.5070536

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.8995

S. Bhatkar, D. C. Duvarney, and R. Sekar, Address obfuscation: an efficient approach to combat a broad range of memory error exploits, Proceedings of the USENIX Security Symposium, 2003.

M. Jacob, H. Mariusz, P. Jakubowski, and . Naldurg, Chit Wei Nick Saw, and Ramarathnam Venkatesan. The superdiversifier: Peephole individualization for software protection, Advances in Information and Computer Security, pp.100-120, 2008.

P. Larsen, A. Homescu, S. Brunthaler, and M. Franz, Automated software diversity, Proceedings of IEEE Security & Privacy, 2014.
DOI : 10.2200/s00686ed1v01y201512spt014

C. Wang, J. Davidson, J. Hill, and J. Knight, Protection of software-based survivability mechanisms, Proceedings of the International Conference on Dependable Systems and Networks, pp.193-202, 2001.

D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight et al., Security through Diversity: Leveraging Virtual Machine Technology, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.26-33, 2009.
DOI : 10.1109/MSP.2009.18