“…Failures are represented by Byzantine agents that are managed by an omniscient adversary that "moves" them from a host process to another and when an agent is in some process it is able to corrupt it in an unforeseen manner. Models investigated so far in the context of mobile Byzantine failures consider mostly round-based computations, and can be classified according to Byzantine mobility constraints: (i) constrained mobility [11] agents may only move from one host to another when protocol messages are sent (similarly to how viruses would propagate), while (ii) unconstrained mobility [3,5,16,21,22,23] agents may move independently of protocol messages. In the case of unconstrained mobility, several variants were investigated [3,5,16,21,22,23]: Reischuk [22] considers that malicious agents are stationary for a given period of time, Ostrovsky and Yung [21] introduce the notion of mobile viruses and define the adversary as an entity that can inject and distribute faults; finally, Garay [16], and more recently Banu et al [3], and Sasaki et al [23] or Bonnet et al [5] consider that processes execute synchronous rounds composed of three phases: send, receive, and compute.…”