Building intrusion-tolerant secure software | IEEE Conference Publication | IEEE Xplore