| | publications
copyright notice
This material is presented to ensure timely dissemination of scholarly and
technical work. Copyright and all rights therein are retained by authors or by
other copyright holders: IEEE,
ACM,
Springer-Verlag,
Elsevier,
Oxford University Press. All persons copying this information are expected to
adhere to the terms and constraints invoked by each author's copyright. In most
cases, these works may not be reposted without the explicit permission of the
copyright holder.
1. journal papers:
R Belchior, J Subenguth, Q Feng, T Hardjono, A Vasconcelos, M Correia. A Brief History of Blockchain Interoperability. Communications of the ACM, Vol. 67, Issue 10, pp. 62-69, September 2024 (pdf).
Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia. FingerCI: Writing Industrial Process Specifications from Network Traffic. International Journal of Critical Infrastructure Protection, to appear (pdf).
Cláudio Correia, Rita Prates, Luís Fonseca, Miguel Correia, Luís Rodrigues. PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems. Formal Aspects of Computing, to appear (pdf).
Rafael Belchior, Limaris Torres, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia. BUNGEE: Dependable Blockchain Views for Interoperability. ACM Distributed Ledger Technologies: Research and Practice, Volume 3, Issue 1, pp 1-25, March 2024 (pdf).
R. Belchior, P. Somogyvari, J. Pfannschmid, A. Vasconcelos, and M. Correia. Hephaestus: Modelling, Analysis, and Performance Evaluation of Cross-Chain Transactions. IEEE Transactions on Reliability, pp. 1-15, 2023 (pdf).
David R. Matos, Miguel L. Pardal, António Rito Silva, Miguel Correia. uVerum: Intrusion Recovery for Microservice Applications. IEEE Access, Vo. 11, pp. 78457-78470, 2023 (pdf, software).
Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Synthesis of Fault-Tolerant Reliable Broadcast Algorithms with Reinforcement Learning. IEEE Access 11: 62394-62408, 2023 (pdf).
Ricardo Moura, Ricardo Lopes, David R. Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: using multiple and diverse ciphers for stronger secure channels. Computers & Security Volume 132, September 2023 (pdf, software).
Rafael Belchior, Luke Riley, Thomas Hardjono, André Vasconcelos, Miguel Correia. Do You Need a Distributed Ledger Technology Interoperability Solution?. ACM Distributed Ledger Technologies: Research and Practice, Vol. 2, N. 1, March 2023 (pdf).
Daniel Andrade, João Silva, Miguel Correia. SRX - Secure Data Backup and Recovery for SGX Applications. IEEE Access, Vol. 10, pp. 35901-35918, 2022 (pdf).
Sérgio Guerreiro, João F. Ferreira, Tiago Fonseca, Miguel Correia. Integrating an academic management system with blockchain: A case study. Blockchain: Research and Applications, Vol. 3, N. 4, Dec. 2022 (pdf)
Rafael Belchior, Sérgio Guerreiro, André Vasconcelos, Miguel Correia.
A Survey on Business Process View Integration: Past, Present, and Future Applications to Blockchain.
Business Process Management Journal, Vol. 54, Issue 8, November 2022 (pdf)
Diogo Vaz, David R. Matos, Miguel L. Pardal, and Miguel Correia. MIRES: Intrusion Recovery for Applications based on Backend-as-a-Service. IEEE Transactions on Cloud Computing, accepted for publication, 2022 (pdf).
David Matos, Miguel Pardal, Miguel Correia.
Sanare: Pluggable Intrusion Recovery for Web Applications.
IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 20, N. 1, pp. 590-605, Jan.-Feb. 2023 (pdf)
Ibéria Medeiros, Nuno F. Neves, Miguel Correia.
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages.
IEEE Transactions on Reliability, volume 71, issue 2, pp 1033-1056, June 2022 (pdf)
Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia.
A Survey on Blockchain Interoperability: Past, Present, and Future Trends.
ACM Computing Surveys, Vol. 54, Issue 8, November 2022 (abstract, pdf)
Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Hermes: Fault-tolerant middleware for blockchain interoperability. Future Generation Computer Systems. Volume 129, Pages 236-251, April 2022. (abstract, pdf)
Cláudio Correia, Miguel Correia, Luís Rodrigues.
Omega: a Secure Event Ordering Service for for the Edge.
IEEE Transactions on Dependable and Secure Computing (TDSC), early access May 2021 (pdf)
Ahad Niknia, Miguel Correia, Jaber Karimpour.
Secure Cloud-of-Clouds Storage with Space-Efficient Secret Sharing.
Journal of Information Security and Applications, Volume 59, June 2021 (pdf, ePrint)
Sérgio Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, Miguel Correia, Pedro Sousa.
Decentralized Business Process Control using Blockchain - An experience report from two applications: Food Supply Chain and Car Registration.
Enterprise Modelling and Information Systems Architectures, Volume 15, 2020 (pdf)
Ray Neiheiser, Luciana Rech, Manuel Bravo, Luis Rodrigues and Miguel Correia.
Fireplug: Efficient and Robust Geo-Replication of Graph Databases.
IEEE Transactions on Parallel and Distributed Systems, vol. 31 , n. 8 , Aug. 2020 (pdf)
Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia.
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS.
IEEE Transactions on Reliability, 68(3): 1168-1188, 2019 (pdf)
Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, and Marco Vieira.
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 101(2): 161-185, February 2019 (pdf)
Naercio Magaia, Carlos Borrego, Paulo Pereira, and Miguel Correia.
ePRIVO: An enhanced PRIvacy-preserVing Opportunistic routing protocol for Vehicular Delay-Tolerant Networks.
IEEE Transactions on Vehicular Technology, 67(11), pp. 11154-11168, 2018 (pdf)
Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, and Marco Vieira.
Benchmarking Static Analysis Tools for Web Security. IEEE Transactions on Reliability, 67(3): 1159-1175, 2018 (pdf)
Naercio Magaia, Zhengguo Sheng, Paulo Pereira, and Miguel Correia.
REPSYS: A robust and distributed incentive scheme for in-network caching and dissemination in Vehicular Delay-Tolerant Networks.
IEEE Wireless Communications Magazine, 25(3): 65-71, 2018
(pdf)
Pedro Costa, Fernando Ramos, and Miguel Correia.
On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, vol. 4(4) pp. 74-82, July/August 2017. (pdf)
Hylson V. Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza.
State machine replication in containers managed by Kubernetes. Journal of Systems Architecture,
Volume 73, Pages 1-60, Feb. 2017. (pdf)
Alysson Bessani, Nuno F. Neves, Paulo Veríssimo, Wagner Dantas, Alexandre Fonseca,
Rui Silva, Pedro Luz, Miguel Correia. JITeR: Just-in-time application-layer routing. Computer Networks,
Volume 104, Pages 122-136, 20 July 2016. (pdf, preprint, software)
Ibéria Medeiros, Nuno F. Neves, Miguel
Correia. Detecting and Removing Web Application Vulnerabilities with Static
Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54-69, March 2016. (pdf, software)
Hylson Vescovi Netto, Lau Cheuk Lung, Tulio Alberton Ribeiro, Miguel Correia, Aldelir Fernando Luiz.
Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage.
ACM Performance Evaluation Review, Volume 43, Issue 3, Pages 21-24, Dec. 2015. (pdf)
Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia,
Betweenness centrality in delay tolerant networks: A survey.
Ad Hoc Networks, 33, pp. 284-305, 2015. (pdf)
Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia,
A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks.
Applied Soft Computing, 30, pp. 104-112, 2015.
(pdf).
A. F. Luiz, L. C. Lung, M. Correia,
MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on
Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)
A. N. Bessani, M. Correia, B. Quaresma,
F. André, P. Sousa, DepSky: Dependable and Secure Storage in a
Cloud-of-Clouds. ACM Transactions on Storage, vol. 9, n. 4, Nov. 2013. (pdf, software)
P. Costa, M. Pasin, A. Bessani, M.
Correia. On the Performance of Byzantine Fault-Tolerant MapReduce.
IEEE Transactions on Dependable and Secure Computing, vol. 10. no.
5, pp. 301-313, Set.-Oct. 2013
(pdf, software)
M. Correia, N. F. Neves, P. Verissimo.
BFT-TO: Intrusion Tolerance with Less Replicas. Computer
Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)
Henrique Moniz, Nuno F. Neves, M.
Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc
Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo
Verissimo. Efficient Byzantine Fault Tolerance. IEEE
Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf, software)
Francisco Rocha, Salvador Abreu, Miguel Correia.
The Final Frontier: Confidentiality and Privacy in the Cloud, IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011. (abstract/pdf)
Henrique Moniz, Nuno Neves, Miguel
Correia, Paulo Verissimo. Randomization Can Be a Healer:
Consensus with Dynamic Omission Failures, Distributed Computing,
24(3-4), pp. 165-175, 2011.
M. Correia, G. S. Veronese, N. F. Neves,
P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing
Systems: A Survey. International Journal of Critical
Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)
H. Moniz and N. F. Neves and M. Correia and P. Veríssimo.
RITAS: Services for Randomized Intrusion Tolerance. IEEE
Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp.
122-136, Jan.-Feb. 2011. (pdf, software)
Paulo Sousa, Alysson Neves
Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo.
Highly Available Intrusion-Tolerant Services with Proactive-Reactive
Recovery. IEEE Transactions on Parallel and Distributed Systems,
vol. 21, n. 4, pp. 452-465, April 2010. (pdf)
J. Antunes and N. F. Neves and M.
Correia and P. Veríssimo and R. Neves. Vulnerability Detection with Attack
Injection. IEEE Transactions on Software Engineering, vol. 36,
n. 3, pp. 357-370, March 2010. (pdf, software)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space.
IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug.
2009. (pdf)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using
Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed
Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract, pdf)
Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo.
The CRUTIAL Way of Critical Infrastructure Protection. IEEE
Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)
Miguel Correia, Alysson Neves Bessani, Paulo
Verissimo. On Byzantine Generals with Alternative Plans.
Journal of Parallel and Distributed Computing, Volume 68, Issue 9,
pp 1291-1296, Sep. 2008 (abstract, pdf)
Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL
reference critical information infrastructure architecture: a
blueprint. International Journal of System of Systems
Engineering, vol. 1, n. 1/2, pp 78-95, 2008.
(selected as one of the best papers
from the 2006 First International Workshop on Critical
Information Infrastructures Security) (abstract, pdf)
Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi,
Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based
Diagnosis through a Distributed Monitor System. IEEE
Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp.
266-279, Oct-Dec, 2007 (abstract, pdf)
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo.
Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication
System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197,
Elsevier, February 2007
(pdf)
Miguel Correia, Nuno F. Neves, Paulo
Veríssimo. From Consensus to Atomic Broadcast: Time-Free
Byzantine-Resistant Protocols without Signatures. Computer Journal.
vol. 41, n. 1, pp 82-96, January 2006 (abstract, pdf, software)
Nuno F. Neves, Miguel Correia, Paulo Veríssimo.
Solving Vector
Consensus with a Wormhole. IEEE
Transactions on Parallel and Distributed Systems, Volume 16, Issue 12, Dec. 2005 Page(s):1120 - 1131
(pdf)
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo.
Low Complexity Byzantine-Resilient Consensus. Distributed Computing,
vol. 17, n. 3, pp. 237--249, March 2005.
(pdf)
edited
Operating
Systems Review, vol. 48, n. 2, 2014, Cloud Computing Dependability: Report and Extended Papers of the Second
International Workshop on Dependability Issues in Cloud Computing (with Neeraj Mittal)
(online)
Operating
Systems Review, July 2013, Column: Selected extended papers from
DISCCO 2012 first international workshop on dependability issues in
cloud computing (with Neeraj Mittal) (online)
2. books
Francisco Rocha, Salvador Abreu,
Miguel Correia. The Next Frontier: Managing Data Confidentiality
and Integrity in the Cloud, IEEE Computer Society Press, March
2013. (Amazon)
Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese),
FCA editores. 2a Edição Atualizada e Aumentada, Set. 2017. (FCA)
Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese),
FCA editores. Set. 2010.
edited
Aris Gkoulalas-Divanis, Miguel P. Correia, Mirco Marchetti, and Dimiter R. Avresky (Eds.). Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE. ISBN 978-1-5386-7659-2 ISBN 978-1-5386-7658-5 (online)
Aris Gkoulalas-Divanis, Miguel P. Correia and Dimiter R. Avresky (Eds.). Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). IEEE. ISBN 978-1-5386-1465-5 ISBN 978-1-5386-1464-8 (online)
Miguel Correia and Neeraj Mittal
(Eds.). 2013. Proceedings of the 2nd International Workshop on
Dependability Issues in Cloud Computing. ACM, New York, NY, USA.
ISBN 978-1-4503-2248-5 (online)
Miguel P. Correia. Proceedings Ninth European
Dependable Computing Conference - EDCC 2012. ISBN
978-0-7695-4671-1 (online)
Luís Soares Barbosa e Miguel Correia,
editores. Actas do INForum - Simpósio de Informática 2010.
Braga, Setembro de 2010.
Miguel Correia and Jean-Phillipe Martin (eds.). Proceedings of
the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems.
ACM International Conference Proceedings Series. ISBN
978-1-59593-986-9 (online)
Miguel Correia and Nuno F. Neves (eds.). Proceedings of the
Workshop on Recent Advances on Intrusion-Tolerant Systems. (online)
book chapters
Miguel Correia and Luís Rodrigues. Security and Privacy. In Artificial Intelligence, Law and Beyond, Springer, 2023. (book, chapter)
Carlos Páscoa, José Tribolet, Miguel Correia. Cyberlearn: An Integrated Framework for Organizational Capability Building. In Exploring Cyber Criminals and Data Privacy Measures, IGI Global, 2023. (chapter)
Arnaldo Gouveia and Miguel Correia. XGBoost(ing) Network Intrusion Detection. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)
Arnaldo Gouveia and Miguel Correia. Deep Learning for Network Intrusion Detection: An Empirical Assessment. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)
Gil Mouta, Miguel L. Pardal, João Bota, Miguel Correia. SPATIO: end-uSer Protection Against ioT IntrusiOns. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)
Miguel Correia. From Byzantine Consensus to Blockchain Consensus. In Essentials of Blockchain Technology, Chapter 3, pp. 40-79, CRC Press, 2020. (pdf)
Tiago Rosado, André Vasconcelos, Miguel Correia. A Blockchain Use Case for Car Registration. In Essentials of Blockchain Technology, Chapter 10, pp. 204-233, CRC Press, 2020. (pdf)
Luís Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. Detecting Botnets and Unknown Network Attacks in Big Traffic Data. In Botnets: Architectures, Countermeasures, and Challenges, Chapter 7, CRC Press, 2020. (pdf)
Luis Filipe Dias and Miguel Correia. Big Data Analytics for Intrusion Detection: An Overview. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security, ed. Padmavathi Ganapathi and D. Shanmugapriya, IGI Global, 2020. (pdf)
Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical
Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)
Miguel Correia. Clouds-of-Clouds for
Dependability and Security: Geo-replication Meets the Cloud (invited chapter). In Euro-Par 2013: Parallel Processing Workshops,
Lecture Notes in Computer Science Volume 8374, pp 95-104, 2014 (pdf)
Henrique Moniz, Alessandra Tedeschi,
Nuno Ferreira Neves, Miguel Correia. A Distributed Systems
Approach to Airborne Self-Separation. In Computational
Models, Software Engineering and Advanced Technologies in Air
Transportation: Next Generation Applications, edited by Li
Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI
Global, October 2009. (pdf)
Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa.
Intrusion-Resilient Middleware Design and Validation. In
Information Assurance, Security and
Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.),
pages 615-678, Emerald, 2009. (pdf)
P. Verissimo, N. F. Neves, M.
Correia, Y. Deswarte, A. Abou El
Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for
Critical Information Infrastructures.
In Architecting Dependable Systems V,
R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS
5135, pp 1-27. Springer Verlag, 2008. (pdf)
Miguel P. Correia. Serviços Distribuídos
Tolerantes a Intrusões: resultados recentes e problemas abertos. V
Simpósio Brasileiro em Segurança da Informação e de Sistemas
Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade
Brasileira de Computação, Setembro de 2005 (pdf)
(slides, versão
extendida, also as DI-FCUL
tech report)
Paulo Veríssimo and Nuno Ferreira Neves and
Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design.
In Architecting Dependable Systems, R.
Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer
Verlag, 2003. An extended version is available as DI/FCUL TR03-05
(pdf)
3. conference papers
2024
Augusto, Andre and Belchior, Rafael and Correia, Miguel and Vasconcelos, Andre and Zhang, Luyao and Hardjono, Thomas. SoK: Security and Privacy of Blockchain Interoperability. IEEE Symposium on Security and Privacy 2024, S. Francisco, USA, May 2024 (pdf, video)
João F. Santos, Miguel Correia, Tiago Dias. Blockchain-based Rental Documentation Management with Audit Support. 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2024 (pdf).
Shankar Subramanian, André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia. Benchmarking Blockchain Bridge Aggregators. 7th IEEE International Conference on Blockchain (Blockchain 2024), August 2024 (pdf).
André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Multi-Party Cross-Chain Asset Transfers. IEEE International Conference on Blockchain and Cryptocurrency 2024 (pdf).
Sebastião Sotto Mayor, Rafael Belchior, Miguel Correia, André Vasconcelos. An Enterprise Architecture Approach to Semantic Blockchain Interoperability. 26th International Conference on Enterprise Information Systems 2024 (pdf).
2023
Cláudio Correia, Miguel Correia, Luís Rodrigues. Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, Nov. 2023 (pdf)
Hélio Borges, Daniel Andrade, João Nuno Silva, Miguel Correia. TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses. IEEE TrustCom 2023, Exeter, UK, Nov. 2023 (pdf).
Daniel Andrade, João Nuno Silva, Miguel Correia. I Can't Escape Myself: Cloud Inter-Processor Attestation and Sealing using Intel SGX. 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023), pp. 198-208, 2023, 2023 IEEE Distinguished Paper Award on Dependable Computing (pdf).
Cláudio Correia, Rita Prates, Miguel Correia, Luís E. T. Rodrigues. PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems. 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023), pp. 111-122, Oct. 2023 (pdf).
Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Automatic Generation of Distributed Algorithms with Generative AI. Proceedings of the 53th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Disrupt track (pdf)
Rodrigo Marques Silva, Cláudio Jose Correia, Miguel Correia, Luís Rodrigues. Deduplication vs Privacy Tradeoffs in Cloud Storage. 38th Annual ACM Symposium on Applied Computing, Tallinn, Estonia, March 2023 (pdf)
2022
André Cordeiro, André Vasconcelos, Miguel Correia. A Catalog of Security Patterns. 29th Conference on Pattern Languages of Programs, Oct. 2022 (pdf, patterns)
Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia. Anonymous Trusted Data Relocation for TEEs. In 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), June 2022 (pdf).
2021
Pedro Marques, Luis Filipe Dias and Miguel Correia. CyberVTI: Cyber Visualization Tool for Intrusion Detection. In 20th IEEE International Symposium on Network Computing and Applications, Nov. 2021 (pdf).
Mara Caldeira and Miguel Correia. Blockchain Address Transparency with DNS. In Proceedings of the 26th IEEE Symposium on Computers and Communications, September 2021 (pdf).
Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Enabling Cross-Jurisdiction Digital Asset Transfer. In Proceedings of the 2021 IEEE International Conference on Services Computing, September 2021 (pdf).
Mihail Brinza, Miguel Correia, João Pereira. Virtual Static Security Analyzer for Web Applications. In Proceedings of Trustcom 2021, August 2021 (pdf, software).
2020
Diogo Vaz, David R. Matos, Miguel L. Pardal, and Miguel Correia. MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks. In Proceedings of MobiQuitous 2020 (pdf).
Tiago Fernandes, Luis Dias and Miguel Correia. C2BID: Cluster Change-Based Intrusion Detection. In Proceedings of Trustcom 2020, December 2020 (pdf).
Luis Dias, Simão Valente and Miguel Correia. Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf, software).
Arnaldo Gouveia and Miguel Correia. Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).
Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Network Flows and Performance Counters against Cryptojacking. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).
Filipe Martins, David Matos, Miguel Pardal and Miguel Correia. Recoverable Token: Recovering from Intrusions against Digital Assets in the Ethereum Blockchain. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).
Alexandra Figueiredo, Tatjana Lide, David Matos and Miguel Correia. MERLIN: Multi-Language Web Vulnerability Detection. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf, software).
Fábio Gomes and Miguel Correia. Cryptojacking Detection with CPU Usage Metrics. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).
Diogo Serranito, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. Blockchain Ecosystem for Verifiable Qualifications. In Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services
(BRAINS), Paris, France, September 2020 (pdf, video, software).
Cláudio Correia, Luis Rodrigues, Miguel Correia. Omega: a Secure Event Ordering Service for the Edge. In Proceedings of the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June/July 2020 (pdf, video).
Rafael Belchior, André Vasconcelos, Miguel Correia. Towards Secure, Decentralized, and Automatic Audits with Blockchain. In Proceedings of the European Conference on Information Systems (ECIS), June 2020 (pdf).
Ricardo Moura, David Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: Secure communication channel with cipher suite diversity. In 35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference, 2020 (pdf, ePrint).
2019
Erick Lavoie, Laurie J. Hendren, Frederic Desprez, and Miguel Correia. Pando: Personal Volunteer Computing in Browsers. In Proceedings of the 2019 ACM/IFIP/USENIX International Middleware Conference, Dec. 2019. (pdf, software)
Luís Dias, Hélder Reia, Rui Neves, and Miguel Correia. OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zoom. In Proceedings of the 13th International Conference on Network and System Security, Sapporo, Japan, Dec. 2019. (pdf, software)
Rafael Belchior, Miguel Correia, and André Vasconcelos. JusticeChain: Using Blockchain to Protect Justice Logs. 27th International Conference on Cooperative Information Systems - CoopIS 2019. (pdf)
Carlos Faria and Miguel Correia. BlockSim: Blockchain Simulator. In IEEE Blockchain Symposium, 2019. (pdf, software)
Erick Lavoie, Laurie Hendren, Frederic Desprez, and Miguel Correia. Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems - SASO 2019, June 2019. (pdf)
2018
David Matos, Miguel Pardal, Georg Carle, and Miguel Correia. RockFS: Cloud-backed File System Resilience to Client-Side Attacks. In Proceedings of the 2018 ACM/IFIP/USENIX International Middleware Conference, Dec. 2018. (pdf, video, software)
Nuno O. Duarte, Sileshi D. Yalew, Nuno Santos, and Miguel Correia. Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions. In Proceedings of MobiQuitous 2018. (pdf)
Filipe Apolinário, Miguel L. Pardal, and Miguel Correia. S-Audit: Efficient Data Integrity Verification for Cloud Storage. In Proceedings of IEEE TrustCom, July 2018. (pdf, software)
Luís Sacramento, Ibéria Medeiros, João Bota, and Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. In Proceedings of IEEE TrustCom, July 2018. (pdf)
Miguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Yalew and Miguel Correia. Introspection for ARM TrustZone with the ITZ Library. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability, and Security, July 2018. (pdf, software)
Hylson Vescovi Netto, Aldelir Fernando Luiz, Miguel Correia, Luciana de Oliveira Rech, Caio Pereira Oliveira.
Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes.
In Proceedings of the 23rd IEEE International Symposium on Computers and Communications, June 2018 Microsoft Award - Best local student paper (pdf)
Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís Rodrigues, Miguel Correia. Fireplug: Flexible and Robust N-version Geo-Replication of Graph Databases.
In Proceedings of the 32nd International Conference on Information Networking (ICOIN), Jan. 2018. (pdf)
2017
André Joaquim, Miguel Pardal, Miguel Correia. Vulnerability-Tolerant Transport Layer Security.
In Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS), Dec. 2017. (pdf, software)
David Matos, Miguel Pardal, and Miguel Correia. Rectify: Black-Box Intrusion Recovery in PaaS Clouds.
In Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference, Dec. 2017. (pdf, software)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid.
In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017.
(pdf)
Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017.
(pdf)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017.
(pdf)
Naércio Magaia, Paulo Pereira, Miguel Correia. REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks.
In Proceedings of the 20th ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems (MSWiM 2017), Nov. 2017.
(pdf)
Erick Lavoie, Laurie Hendren, and Miguel Correia. Xor-Based Topology Management Beyond Kademlia.
In Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), Sep. 2017.
(pdf)
Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia and Marco Vieira. On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
In Proceedings of the 13th European Dependable Computing Conference (EDCC 2017), Sep. 2017. (pdf)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications.
In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017.
(pdf)
Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Demonstrating a Tool for Injection Attack Prevention in MySQL.
In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN), Jun. 2017. (pdf)
Diogo Frazão, João Redol, and Miguel Correia. PARADISE: Modular Click Fraud Detection.
In 2017 European Security Conference: Cybersecurity Analytics, Jun. 2017.
Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks.
In Proceedings of the IFIP Networking Conference, Jun. 2017. (pdf)
Arnaldo Gouveia, Miguel Correia. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection.
In Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), Jun. 2017. (pdf)
Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce.
In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf, software)
Best Student Paper Award
2016
David Matos, Miguel Correia. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)
Diogo Raposo, Miguel Pardal, Luís Rodrigues, Miguel Correia. MACHETE: Multi-path Communication for Security.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software, software)
Karan Balu, Miguel Pardal, Miguel Correia. DARSHANA: Detecting Route Hijacking For Communication Confidentiality.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)
Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)
Christine Blakemore, João Redol, Miguel Correia. Fingerprinting for Web Applications: from Devices to Related Groups.
In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2016. (pdf)
Ibéria Medeiros, Nuno F. Neves, Miguel Correia. DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities.
In Proceedings of the IEEE International Symposium on Software Testing and Analysis (ISSTA), Jul. 2016. (pdf)
Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Equipping WAP with WEAPONS to Detect Vulnerabilities.
In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN), Jun. 2016. (pdf, software)
Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce.
In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf, software)
Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. Hacking the DBMS to Prevent Injection Attacks.
In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CoDASPy), March 2016. (pdf)
Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos.
In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)
2015
Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs.
In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015. (pdf)
Dário Nascimento, Miguel Correia. Shuttle: Intrusion Recovery for PaaS. In Proceedings of the 35th International Conference on Distributed Computing Systems (ICDCS), Jun.-Jul. 2015 (pdf, slides, video, software)
Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing.
In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)
2014
A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia,
N. Pasin, P. Verissimo. SCFS: a Shared Cloud-backed File System.
In Proceedings of Usenix Annual Technical Conference (ATC), 2014.
(pdf, software, software)
I. Medeiros, N. F. Neves,
M. Correia. Automatic Detection and Correction of Web Application Vulnerabilities
using Data Mining to Predict False Positives.
In Proceedings of 23rd International World Wide Web Conference, 2014.
(pdf, software)
2013
A. Bessani, M. Santos, J. Félix, N. F. Neves,
M. Correia. On The Efficiency of Durable State Machine Replication.
In Proceedings of the USENIX Annual Technical Conference (ATC), 2013
(pdf)
I. Medeiros, N. F. Neves, M. Correia.
Securing Energy Metering Software with Automatic Source Code Correction.
In Proceedings of the 11th IEEE International Conference on Industrial
Informatics (INDIN), Jul. 2013 (pdf)
F. Dettoni, L. C. Lung, M. Correia, A. F.
Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin
Virtual Machines. In Proceedings of the 8th IEEE Symposium on
Computers and Communications (ISCC), Jul. 2013 (pdf)
N. Magaia, P. R. Pereira, M. Correia. Nodes'
Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of
CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)
N. Magaia, P. R. Pereira, M. Correia. Selfish
and Malicious Behavior in Delay Tolerant Networks. In Proceedings of
Future Network and Mobile Summit 2013, July 2013 (pdf)
2012
Miguel Correia, Daniel G. Ferro, Flavio
Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems,
In Proceedings of the Usenix Annual Technical Conference (ATC), 2012
(pdf)
2011
Xavier Vilaça, João Leitão, Miguel
Correia, Luís Rodrigues. N-party BAR Transfer. In
Proceedings of the 15th International Conference On Principles of
Distributed Systems (OPODIS), Dec. 2011 (pdf)
Pedro Costa, Marcelo Pasin, Alysson N.
Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce:
Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE
International Conference on Cloud Computing Technology and Science (CloudCom),
Nov-Dec. 2011. (pdf, software)
Best Paper Award
Aldelir Luiz, Lau Cheuk Lung and Miguel
Correia. Byzantine Fault-Tolerant Transaction Processing for
Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA).
July 2011 (pdf)
A. N. Bessani, M. Correia, B. Quaresma,
F. André, P. Sousa, DepSky: Dependable and Secure Storage in a
Cloud-of-Clouds. In Proceedings
of the European Conference on Computer Systems (EuroSys 2011).
Saltzburg, Austria, April
2011. (pdf, software)
2010
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA:
Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of
the 12th IEEE
International High Assurance Systems Engineering Symposium (HASE).
November 2010. (pdf, software)
Henrique Moniz, Nuno Ferreira Neves, Miguel
Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks,
In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN), Chicago, USA, June 2010. (pdf)
Valdir Stumm Júnior, Lau Cheuk Lung, Miguel
Correia, Joni da Silva Fraga, Jim Lau, Intrusion Tolerant Services
Through Virtualization: a Shared Memory Approach, In Proceedings of the
24th IEEE International Conference on Advanced Information Networking and
Applications, April 2010. (pdf)
Miguel Correia, Giuliana Santos Veronese, Lau
Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In
Proceedings of the 25th Annual ACM Symposium on Applied Computing, March
2010. (pdf)
2009
Henrique Moniz, Nuno F. Neves, Miguel
Correia, Paulo Verissimo. Randomization Can Be a Healer:
Consensus with Dynamic Omission Failures. In Proceedings of
the 23rd International Symposium on Distributed Computing (DISC).
September 2009. (pdf)
Best Student Paper Award
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One's
Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the
30th IEEE Symposium on Reliable Distributed
Systems (SRDS). September 2009. (pdf, software)
Paulo Sousa, Alysson N. Bessani, Wagner S.
Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant
Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of
the International Conference on Dependable Systems and Networks (DSN), Jul
2009. (pdf)
Paulo Veríssimo, Alysson Bessani,
Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing
Modular and Redundant Cyber Architectures for Process Control:
Lessons learned. In Proceedings
of the 42nd Hawaii International Conference for the Systems Sciences
(HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)
2008
Giuliana Santos Veronese,
Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. Finite Memory:
a Vulnerability of Intrusion-Tolerant Systems. In Proceedings of the
7th IEEE International Symposium on Network Computing and Applications (NCA).
July 2008 (pdf)
Alysson Bessani, Eduardo Alchieri, Miguel Correia and Joni Fraga.
DepSpace: A Byzantine Fault-Tolerant Coordination Service.
In Proceedings
of the European Conference on Computer Systems (EuroSys 2008). April
2008. (pdf, software, software)
2007
Henrique Moniz, Nuno Ferreira Neves, Miguel Correia,
António Casimiro, Paulo Verissimo. Intrusion Tolerance in
Wireless Environments: An Experimental Evaluation. In
Proceedings of the 13th IEEE Pacific Rim Dependable Computing
Conference, pages 357-364. December 2007 (pdf)
Paulo Sousa, Alysson Neves
Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo.
Resilient Intrusion Tolerance through Proactive and Reactive
Recovery. In Proceedings of the 13th IEEE Pacific Rim
Dependable Computing Conference, pages 373--380. December 2007 (pdf)
Wagner Saback Dantas, Alysson
Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating
Byzantine Quorum Systems. In Proceedings of the 28th IEEE Symposium on Reliable Distributed
Systems (SRDS), pages 253-264. October 2007. (pdf)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Decoupled Quorum-based Byzantine-Resilient
Coordination in Open Distributed Systems. In Proceedings of the
6th IEEE International Symposium on Network Computing and Applications (NCA),
pages 231-238,
July 2007. (pdf)
Fábio Favarim, Joni Fraga, Lau
C. Lung, Miguel Correia. GridTS: A New Approach for Fault Tolerant
Scheduling in Grid Computing. In Proceedings of the
6th IEEE International Symposium on Network Computing and Applications (NCA),
pages 187-194,
July 2007. (pdf)
Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F.
Santos. Exploiting Tuple Spaces to Provide Fault-Tolerant
Scheduling on Computational Grids.
In Proceedings of the 10th IEEE International Symposium on Object and
component-oriented Real-time distributed Computing (ISORC),
pages 403-411. May
2007. (pdf)
2006
H. Moniz and N. F. Neves and M. Correia and P. Veríssimo.
Experimental Comparison of Local and Shared Coin Randomized Consensus
Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed
Systems. pages 235-244, Leeds, UK, October 2006 (pdf, software)
H. Moniz and N. F. Neves and M. Correia and P. Veríssimo.
Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of
the International Conference on Dependable Systems and Networks (DSN), pages
568-577, June
2006. (pdf, software)
N. F. Neves and J. Antunes and M.
Correia and P. Veríssimo and R. Neves. Using Attack Injection to Discover New
Vulnerabilities. In Proceedings of the International Conference on
Dependable Systems and Networks (DSN), pages 457-466, June 2006. (pdf, software)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using
Policy-Enforced Tuple Spaces. In Proceedings of the 26th International
Conference on Distributed Computing Systems (ICDCS), July 2006. (pdf)
L.C.Lung and F.Favarim and G.T.Santos
and M.Correia. An Infrastructure for Adaptive Fault Tolerance on FT-CORBA.
In Proceedings of the
9th IEEE International Symposium on Object and
component-oriented Real-time distributed Computing (ISORC). June 2006. (pdf)
2004
M. Correia and N. F. Neves and P. Veríssimo.
How to Tolerate
Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed
Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf)
2002
M. Correia, P. Veríssimo, Nuno F. Neves.
The Design of a COTS Real-Time Distributed Security
Kernel. In Proceedings of the Fourth European Dependable Computing Conference.
Toulouse,
France, pages 234--252, October 2002.
(abstract)
(zipped ps)
(ps, software)
M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo.
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure
Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed
Systems. Suita, Japan,
pages 2--11, October 2002.
(abstract)
(zipped ps)
(ps)
1998
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto.
QoS control: an application integrated
framework, In Proceedings of the 1st IEEE International Conference on ATM (ICATM´98), Colmar, France, June 1998.
(abstract)(ps.gz)
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto.
An architecture for dynamic multimedia QoS
control. In Proceedings of the 7th IFIP/ICCC Conference on Information Networks and Data Applications (INDC´98), Aveiro, Portugal, June 1998.
(abstract, ps.gz)
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto.
Integrated dynamic QoS control for multimedia
applications. In Proceedings of the International Symposium SYBEN'98, Broadband Networks and Multimedia
Systems, Zurich, Switzerland, May 1998. (abstract, ps.gz)
1995
Miguel Correia, Paulo Pinto. Low-Level Multimedia Synchronization Algorithms on Broadband Networks.
ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract, ps.gz)
4. workshop papers
André Augusto, Rafael Belchior, Imre Kocsis, László Gonczy, André Vasconcelos, Miguel Correia. CBDC bridging between Hyperledger Fabric and permissioned EVM-based blockchains. IEEE ICBC Crosschain Workshop 2023 (pdf)
Félix Monteiro, Miguel Correia. Decentralised Autonomous Organisations for Public Procurement. EASE 2023 4th Blockchain Software Engineering Workshop, Oulu, Finland, June 2023 (pdf)
Filipe Apolinário, João Guiomar, Nelson Escravana, Seven Hrastnik, Éric Hervé, Miguel Correia and Miguel L. Pardal. ComSEC: Secure communications for baggage handling systems. 3rd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection - CSP4CIP (with ESORICS 2022), Sep. 2022.
Rafael Belchior, Benedikt Putz, Guenther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro, SSIBAC: Self-Sovereign Identity Based Access Control. In 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), December 2020 (pdf).
David R. Matos, Miguel L. Pardal, Pedro Adão, Rito Silva and Miguel Correia. Securing Electronic Health Records in the Cloud. 1st Workshop on Privacy by Design in Distributed Systems (with EuroSys 2018), May 2018. (pdf)
Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Miguel Correia. Light-SPD: A Platform to Prototype Secure Mobile Applications.
Workshop on Privacy-Aware Mobile Computing (PAMCO), Paderborn, Germany, Jul. 2016. (pdf)
Hylson Vescovi Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung,
Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage.
In Proceedings of ACM SIGMETRICS 3rd Workshop on Distributed Cloud Computing (DCC), Jun. 2015. (pdf)
Miguel Correia, Pedro Costa, Marcelo Pasin,
Alysson Bessani, Fernando Ramos, Paulo Verissimo. On the Feasibility of
Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. In First
International Workshop on Dependability Issues in Cloud Computing (DISCCO
2012), Oct. 2012 (pdf)
F. Rocha, M. Correia. Lucy in the Sky
without Diamonds: Stealing Confidential Data in the Cloud. In
Proceedings of the 1st International Workshop on Dependability of
Clouds, Data Centers and Virtual Computing Environments (DCDV, with
DSN'11), Hong Kong, June 2011. (pdf)
G. Nascimento, M. Correia.
Anomaly-based Intrusion Detection in Software as a Service.
In Proceedings of the 5th Workshop on Recent Advances on
Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong,
June 2011. (pdf)
A. N. Bessani, P. Sousa, M. Correia. Active Quorum Systems. In Proceedings of the Workshop on Hot
Topics in System Dependability (HotDep), October 2010. (pdf)
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung.
Highly-Resilient Services for Critical Infrastructures. In Proceedings of the
Workshop on Embedded Systems and Communications Security (ESCS). September 2009.
(pdf)
Wagner Saback Dantas, Alysson
Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving
the Timeliness and Reliability of Control Traffic in Utility Networks. In
Proceedings of the Workshop on Hot Topics in System Dependability (HotDep),
Jun 2009. (pdf)
F. Favarim and
L. C. Lung and J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser Computational
Grids based on Tuple Spaces. In International Workshop on
Dependability in Service-oriented Grids (WODSOG). October 1st, 2006,
Leeds, UK (pdf)
P. Veríssimo, N. F. Neves and M. Correia.
CRUTIAL: The Blueprint of a Reference Critical Information
Infrastructure Architecture. In CRITIS'06 1st International
Workshop on Critical Information Infrastructures Security, pages 1-14,
Samos Island, Greece, August 30 - September 2, 2006 (pdf)
Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia,
Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the
DISTRACT Architecture. In Workshop on Dependable Distributed Data
Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004.
(pdf)
Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves.
The Architecture of a Secure Group Communication System
Based on Intrusion Tolerance. In International Workshop on Applied
Reliable Group Communication (WARGC'01), in conjunction with ICDCS 2001,
Phoenix, USA, pages 17--22, April 2001. (abstract, pdf)
Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia.
The Middleware Architecture of
MAFTIA: A Blueprint. In
Proceedings
of the IEEE Third Information Survivability Workshop (ISW-2000), pages
24--26, Boston, USA, October 2000. (abstract)
(pdf)
Pedro Moniz, Miguel Correia, Nuno Mamede.
Reasoning about Space in SNePS. SNePS Workshop, Buffalo, NY, USA, 1994.
(pdf)
5.
national conference/journals papers
Rodrigo Silva, Cláudio Correia, Miguel Correia and Luís Rodrigues. Ataques de Frequência em Deduplicação Cifrada na Nuvem. INForum 2022, Sep. 2022.
Rita Prates, Cláudio Correia, Miguel Correia, Luís Rodrigues. Prova de Resposta Pontual no Acesso ao Armazenamento Contratado na Periferia da Rede. INForum 2021, Sep. 2021.
J. Tribolet, P. Ferreira, M. Correia, C. Ribeiro, P. Adão, N. Escravana.
Cibersegurança: o papel da engenharia informática.
Ingenium. N.º 159. Maio/Junho 2017.
Hylson Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz.
Replicação de Máquinas de Estado em containers no Kubernetes: uma Proposta de Integração.
Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.
Paulo R. Pinho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lasaro Jonas Camargos.
Replicação de Máquina de Estado Baseada em Prioridade com PRaft.
Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.
Hylson Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz.
RafStore: Armazenamento Confiável, Rápido e Geo-Replicado em Provedores de Nuvens.
Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.
Daniel Presser, Lau Cheuk Lung, Miguel Correia.
Tolerância a Faltas Arbitrárias em Processamento Distribuádo de Grafos.
Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.
P. H. Morais, L. C. Lung, L. O. Rech, F. Dettoni, M. Correia.
Replicação de Máquina de Estado Usando Detectores de Intrusão e Virtualização.
Anais do IV Simpósio Brasileiro de Engenharia de Sistemas Computacionais, 2014.
Ricardo Carvalho, Miguel Correia.
Authentication Security through Diversity and Redundancy for Cloud Computing.
Actas do INForum 2014.
A. F. Luiz, L. C. Lung, M. Correia, V. S. Júnior.
Validação Atômica Não-Bloqueante com Faltas Bizantinas.
Anais do Simpósio Brasileiro de Redes de
Computadores (SBRC), 2014.
A. F. Luiz, L. C. Lung, M. Correia.
Processamento Justo de Transações em Bancos de Dados Tolerantes a
Faltas Bizantinas. Anais do Simpósio Brasileiro de Redes de
Computadores (SBRC), 2013.
F. Dettoni, L. C. Lung, A. F. Luiz,
M. Correia. Replicação por Máquina de Estados Tolerante a Faltas
Bizantinas usando Máquinas Virtuais Gêmeas. Anais do Simpósio
Brasileiro de Redes de Computadores (SBRC), 2013.
L. Arantes, J. Lejeune, M. Piffaretti,
O. Marin. P. Sens, J. Sopena, A. N. Bessani, V. V. Cogo, M. Correia,
P. Costa, M. Pasin, F. Silva. Vers une plate-forme MapReduce
tolérant les faulted byzantines. Technique et Science
Informatiques, 2012 (to appear)
J. Félix, A. Bessani, M. Correia.
Gestão de Estado Eficiente no Serviço de Coordenação DDS.
Actas do INFORUM 2012, Setembro 2012. (pdf)
A. F. Luiz, L. C. Lung, M. Correia.
RIST: Um Middleware para Replicação e Interoperabilidade de
Sistemas Transacionais. Anais do XXXVIII Seminário Integrado de
Software e Hardware (SEMISH), Julho 2011.
A. F. Luiz, L. C. Lung, M. Correia. Protocolo Tolerante a Faltas Bizantinas para Bases de
Dados Transacionais. Anais do Simpósio Brasileiro de Redes de
Computadores (SBRC), Junho 2011. (pdf)
Luciana
Arantes, Jonathan Lejeune, Madeleine Piffaretti, Olivier Marin,
Pierre Sens et Julien Sopena, Alysson Bessani, Vinicius Cogo,
Miguel Correia, Pedro Costa, Marcelo Pasin, Fabricio Silva. Étude d'une architecture MapReduce
tolérant les fautes byzantines. RenPar'20, Maio 2011.
Sérgio Nunes, Miguel Correia. From
Risk Awareness to Security Controls: Benefits of Honeypots to
Companies. In Proceedings of the 2nd Ibero-American Web
Applications Security Conference 2010 - IBWAS'10, Dezembro 2010. (pdf)
Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da
Silva Fraga, Jim Lau. SMIT: Uma Arquitetura Tolerante a Intrusões
Baseada em Virtualização. In Simpósio Brasileiro de Segurança
(SBSeg),
Outubro 2010. (pdf)
S. Nunes, M. Correia. Web
Application Risk Awareness with High Interaction Honeypots. In
Actas do INForum - Simpósio de Informática 2010. Braga, Setembro de
2010. (pdf)
Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da
Silva Fraga, Jim Lau. Desenvolvimento de Serviços Tolerantes a
Intrusões Usando Máquinas Virtuais. XXXVI Seminário Integrado de
Software e Hardware (CSBC 2009 - SEMISH). Bento Gonçaves RS, Brasil,
Julho de 2009. (pdf)
Ibéria Medeiros, Miguel Correia. Detecção de Vulnerabilidades
de Inteiros na Adaptação de Software de 32 para 64 bits. Actas
da 3ª Conferência Nacional sobre Segurança nas Organizações
(SINO'07). Lisboa, Novembro de 2007. (pdf, software)
Carlos Lourenço, Miguel Correia. Segurança por Omissão de
Sistemas de Gestão de Bases de Dados. Actas da 3ª Conferência
Nacional sobre Segurança nas Organizações (SINO'07). Lisboa,
Novembro de 2007. (pdf)
Pan Jieke, João Redol, Miguel Correia. Detecção Cooperativa de
Intrusões em Redes Carrier Ethernet. Actas da 3ª Conferência
Nacional sobre Segurança nas Organizações (SINO'07). Lisboa,
Novembro de 2007. (pdf)
Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F.
Santos. Explorando a Abstração Espaço de Tuplas no Escalonamento
em Grades Computacionais.
In
26º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém,
Brazil, Mai./Jun. 2007. (pdf)
Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel
Correia, Joni da Silva Fraga, Lau Cheuk Lung. DepSpace: Um Middleware para Coordenacão em Ambientes Dinâmicos e Não Confiáveis. In
Salão de Ferramentas do 25º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém,
Brazil, Mai./Jun. 2007. (pdf)
Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel
Correia, Joni da Silva Fraga, Lau Cheuk Lung. Provendo
Confidencialidade em Espaços de Tuplas Tolerantes a Intrusões. In
VI Simpósio Brasileiro em Segurança da Informação e de
Sistemas Computacionais (SBSeg 2006), Santos, Brazil, Aug./Sep.
2006. (pdf)
João Antunes, Nuno F. Neves, Miguel Correia, Paulo Veríssimo, Rui
Neves. Diagnóstico de Vulnerabilidades através de Injecção de Ataques.
In 1ª Conferência Nacional sobre Segurança Informática nas
Organizações. Covilhã, Portugal, pages 61-76, November 2005.
Pan Jieke, Miguel Correia, Nuno F. Neves, Paulo
Veríssimo. Um Núcleo de Segurança Distribuído para Suporte a Protocolos
Tolerantes a Intrusões. In 1ª Conferência Nacional sobre
Segurança Informática nas Organizações. Covilhã, Portugal, pages
13-32, November
2005. (pdf)
José Pascoal, Tiago Jorge, Miguel Correia, Nuno F. Neves, Paulo
Veríssimo. FTP Tolerante a Intrusões. In 1ª Conferência Nacional sobre
Segurança Informática nas Organizações. Covilhã, Portugal, pages
33-52, November
2005. (pdf)
Tiago Jorge, José Pascoal, Miguel Correia, Nuno F. Neves, Paulo
Veríssimo. Concretização de um Sistema de Comunicação em Grupo Tolerante a
Intrusões. In 7ª Conferência sobre Redes de Computadores. Leiria,
Portugal, pages 111-122, October 2004. (pdf)
Lau Cheuk Lung , Miguel Correia,
Nuno Ferreira Neves, Paulo Veríssimo. A
Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB. In
21º Simpósio Brasileiro de Redes de Computadores. Natal, Brasil, pages
649--663, May 2003.
(pdf)
6. technical reports
André S. Proença, Tiago R. Dias, Miguel P. Correia. Blockchain Based Residential Smart Rent, arXiv:2402.05737, 2024 (doc)
João F. Santos, Tiago R. Dias, Miguel P. Correia. Blockchain-based Rental Documentation Management with Audit Support, arXiv:2402.06704, 2024 (doc)
Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Learning to generate Reliable Broadcast Algorithms, arXiv, 2022 (doc)
Rafael Belchior, Limaris Torres, Jonas Pfannschmid, André Vasconcelos, Miguel Correia. Is My Perspective Better Than Yours? Blockchain Interoperability with Views, TechRxiv, v2, 07.07.2022 (doc)
Rafael Belchior, Miguel Correia, Thomas Hardjono. DLT Gateway Crash Recovery Mechanism, IETF Internet-Draft draft-belchior-gateway-recovery v4, May 2022 (doc)
SPARTA deliverable D4.4 Cybersecurity threat prediction framework, Mar. 2022
SPARTA deliverable D4.6 Visual Analytics System for Cybersecurity threat analysis, Dec. 2021
Rafael Belchior, Miguel Correia, Thomas Hardjono. DLT Gateway Crash Recovery Mechanism, IETF Internet-Draft draft-belchior-gateway-recovery v1, March 2021 (doc)
SPARTA deliverable D4.2 Cybersecurity threat analysis model, January 2021
QualiChain project deliverable D5.3 QualiChain Components Design and Development, Release II, September 2020
Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. A Survey on Blockchain Interoperability: Past, Present, and Future Trends, arXiv:2005.14282. August 2020
QualiChain project deliverable D6.1 QualiChain Testing Plan, January 2020
QualiChain project deliverable D5.2 QualiChain Components Design and Development, Release I, December 2019
Ibéria Medeiros, Nuno Neves, Miguel Correia. Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages, arXiv:1910.06826. October 2019
QualiChain project deliverable D5.1 QualiChain Integrated Architecture, October 2019
QualiChain project deliverable D4.1 QualiChain Value Adding Services Foundations, August 2019
QualiChain project deliverable D7.1 Pilots Preparation Handbook, July 2019
QualiChain project deliverable D2.3 QualiChain Implications' Assessment Framework, June 2019
QualiChain project deliverable D2.1 Landscape Analysis, QualiChain Concept and Potential Investigation Report, June 2019
Erick Lavoie, Laurie Hendren, Fréderic Desprez, Miguel Correia. Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC, arXiv:1904.11402. April 2019
QualiChain project deliverable D9.1 Project Management Handbook, January 2019
Erick Lavoie, Laurie Hendren, Fréderic Desprez, Miguel Correia. Pando: Personal Volunteer Computing in Browsers, arXiv:1803.08426. March 2018
SafeCloud project deliverable D2.8, Final Secure File System, February 2018
SafeCloud project deliverable D1.3, Final version of the private communication middleware, February 2018
SafeCloud project deliverable D2.4, Initial Secure File System, February 2017
SafeCloud project deliverable D1.2, First version of the private communication middleware components, February 2017
SafeCloud project deliverable D4.1, SafeCloud Architecture, August 2016
SafeCloud project deliverable D1.1, Private communication middleware architecture, February 2016
Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia Medusa: An Efficient Cloud Fault-Tolerant MapReduce, arXiv:1511.07185. November 2015
Alysson Bessani, Miguel
Correia. Consistency Anchor Formalization and Correctness Proofs.
DI-FCUL TR-2014-2, May 2014 (pdf)
Giuliana Veronese, Miguel
Correia, Alysson Bessani. Spin One's Wheels? Byzantine Fault
Tolerance with a Spinning Primary. DI-FCUL TR-2009-14, June 2009 (pdf)
G. Veronese, M. Correia, A.
Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance:
Algorithm and Evaluation. DI-FCUL TR-2009-15, June 2009. (pdf)
Nuno Ferreira Neves, Paulo
Veríssimo (Editors), Architecture, Services and Protocols for CRUTIAL,
Project CRUTIAL, Deliverable D18, March 2009. (also Technical Report
DI/FCUL TR-09-5, Department of Computer Science, University of Lisbon,
March 2009)
(pdf)
Giuliana Franceschinis
(Editor), Experimental Validation of Architectural Solutions,
Project CRUTIAL, Deliverable D20, March 2009. (also Technical
Report DI/FCUL TR-09-8, Department of Computer Science, University of
Lisbon, March 2009)
(pdf)
R. Baldoni et al.
Resilient Computing Courseware. Resist NoE Deliverable D38. Technical Report DI/FCUL TR-09-10.
May 2009
(abstract/pdf)
R. Baldoni et al. Resilient Computing Curriculum. Resist NoE Deliverable D37. Technical Report DI/FCUL TR-09-9.
May 2009
(abstract/pdf)
G. Veronese, M. Correia, A.
Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance.
DI-FCUL TR-2009-15, Dec. 2008. (pdf)
N. F. Neves and P. Veríssimo, Editors. CRUTIAL
Deliverable D10 - Preliminary specification of services and protocols.
January 2008 (abstract/pdf)
Paulo
Sousa and Alysson Neves Bessani and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo.
Resilient Intrusion Tolerance through Proactive and Reactive Recovery.
Technical Report DI/FCUL TR-07-17. October 2007
(abstract/pdf)
RESIST Network of Excellence Deliverable D13,
From
Resilience-Building to Resilience-Scaling Technologies: Directions
(abstract/pdf)
N. F. Neves and P. Veríssimo, Editors. CRUTIAL
Deliverable D4 - Preliminary architecture specification, January
2007 (pdf)
W. Ahrendt, J. Karlsson, R. Jimenez-Peris, U. Voges, H.
Pfeifer, G. Lami, F. Giandomenico, Andrea Bondavalli, Paulo Veríssimo,
Miguel Correia, P. Palanque, Michel Raynal, C. Cachin, G. Urvoy-Keller,
N. Suri, L. Strigini, R. Bloomfield, A. Pataricza, I. Majzik, H.
Waeselynck, J. C. Fabre, K. Kanoun, J.-C. Laprie, L. Simoncini,
Resilient Computing Curriculum Draft -- ReSIST NoE Deliverable D16. June 2007 (abstract/pdf)
Alysson Neves Bessani and Paulo
Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo.
Intrusion-Tolerant Protection for Critical Infrastructures.
Technical Report DI/FCUL TR-07-8. April 2007 (abstract/pdf)
Miguel Correia and Nuno F. Neves (editors).
Proceedings of the First Workshop on Recent Advances on
Intrusion-Tolerant Systems. Technical Report DI/FCUL TR-07-5. March
2007 (abstract/pdf)
Miguel Correia, Nuno F. Neves, Paulo Veríssimo.
Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey.
In Resilience-building Technologies: State of Knowledge, RESIST
Network of Excellence Deliverable D12, Part Algo, Chapter 1, September
2006. (chapter's pdf, report
abstract/pdf)
Rafael R. Obelheiro, Alysson Neves Bessani,
Lau Cheuk Lung, Miguel Correia. How Practical Are Intrusion-Tolerant
Systems? Technical Report DI/FCUL TR-06-15. September 2006. (abstract/pdf)
Alysson Neves Bessani and Miguel Correia
and Joni da Silva Fraga and L. C. Lung. Towards a Dependable
Tuple Space.
Technical Report DI/FCUL TR-06-4. April 2006. (abstract/pdf)
Gunjan
Khanna, Mike Yu Cheng, Jagadeesh Dyaberi, Saurabh Bagchi, Miguel P.
Correia, Paulo Verissimo, Probabilistic Diagnosis Through
Non-Intrusive Monitoring In Distributed Applications. Technical Report
Purdue Univ. TR-ECE-05-19, December 2005. (pdf)
Gunjan
Khanna, Mike Yu Cheng, Padma Varadharajan, Miguel P. Correia, Paulo J.
Verissimo, Saurabh Bagchi. Automated Monitor Based Diagnosis In
Distributed System. Technical Report Purdue Univ.
TR-ECE-05-13, November 2005. (pdf)
Miguel Correia, Alysson N. Bessani, Nuno F.
Neves, Lau C. Lung, Paulo Veríssimo. Improving Byzantine Protocols
with Secure Computational Components. Technical Report
DI/FCUL TR-05-20. December 2005. (abstract/pdf)
M. Correia and N. F. Neves and P. Veríssimo.
How to Tolerate
Half Less One Byzantine Nodes in Practical Distributed Systems.
Technical Report DI/FCUL TR-04-6. Department of Computer Science, University
of Lisbon. July 2004. (abstract/pdf) (extended
version of the SRDS'04 paper; includes proofs)
M. Correia and N. F. Neves and P. Veríssimo. From Consensus to Atomic
Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Technical Report DI/FCUL TR-04-5. Department of Computer Science, University
of Lisbon. June 2004. (abstract/pdf, software). Revised
version as Technical Report DI/FCUL TR-05-14 (asbtract/pdf)
M. Correia and N. F. Neves and L. C. Lung and P. Veríssimo. Low
Complexity Byzantine-Resilient Consensus. Technical Report DI/FCUL
TR-03-25. Department of Computer Science, University of Lisbon. August 2003. (abstract/pdf)
(older version of the Distributed Computing 2004 consensus paper)
Nuno F. Neves, Paulo Veríssimo, Editors. Complete
Specification of APIs and Protocols for the MAFTIA Middleware. Project MAFTIA deliverable D9, July 2002. (abstract/pdf)
Nuno F. Neves, Paulo Veríssimo, Editors. Running Lab Prototype of MAFTIA
Middleware. Project MAFTIA deliverable D25, March 2002. (pdf)
M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel (Extended
Version). DI/FCUL TR 01-12, Department of Computer Science, University of Lisbon, University of Lisbon, December
2001. (abstract/pdf)
(extended version of
an older version of the EDCC paper)
N. F. Neves and P. Veríssimo, Editors. First Specification of APIs and Protocols for MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable
D24, August 2001. (abstract/pdf)
P. Veríssimo and N. F. Neves, Editors. Service and Protocol Architecture
for the MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D23, January 2001.
(abstract/pdf)
Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia.
The Middleware Architecture of
MAFTIA: A Blueprint. Technical Report DI/FCUL TR-00-6. Department of
Computer Science, University of Lisbon. September 2000. (abstract/pdf)
(extended version of the ISW-2000 paper)
7. short papers
Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia. FingerCI: Generating Specifications for Critical Infrastructures. 37th Annual ACM Symposium on Applied Computing, April 2022.(pdf).
Pedro Marques, Luis Filipe Dias and Miguel Correia. CiberVIZ - Ferramenta de Visualização e Deteção de Intrusões no Ciberespaço. 3º Encontro de Investigação e Desenvolvimento em Ciências Militares. Nov. 2021
Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Fluxos de Rede e Indicadores de Desempenho contra o Cryptojacking. Jornadas das Engenharias da Academia Militar (JEAM-V), 2021.
JR Amado, S Signorello, M Correia, F Ramos. Poster: Speeding Up Network Intrusion Detection. 2020 IEEE 28th International Conference on Network Protocols (ICNP), 2020.
Marcelo Silva, Miguel Correia and Miguel Matos. P2P and Cloud File Storage for Blockchain Applications (short paper). In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).
Tiago Fernandes, Luís Dias and Miguel Correia. Detecção de Intrusões por Monitorização do Comportamento através de Mudanças de Clusters. Jornadas das Engenharias da Academia Militar, 2020.
Alexandra Figueiredo, Tatjana Lide and Miguel Correia. Multi-Language Web Vulnerability Detection (fast abstract). In Proceedings of ISSRE 2020, October 2020 (pdf).
Simão Valente, Luís Dias and Miguel Correia. Detecção de Intrusões com Diversas Fontes de Dados e Aprendizagem Não Supervisionada. Jornadas das Engenharias da Academia Militar, 2019.
Hélder Figueiredo Reia, Rui Neves, Miguel Correia, Luís Dias. Análise de dados de segurança informática em tempo real Jornadas das Engenharias da Academia Militar, 2018.
Roberto Ponte, Ibéria Medeiros, and Miguel Correia. Fuzzing Ethereum Smart Contracts (research statement). DSN Workshop on Byzantine Consensus and Resilient Blockchains (BCRB '18), June 2018.
Miguel Guerra, Miguel Correia, Benjamin Tabmann, Hans P. Reiser. ITZ: An Introspection Library for ARM TrustZone.
In INForum 2017, Out. 2017.
André Joaquim, Miguel Pardal, Miguel Correia. vtTLS: A Vulnerability-Tolerant Communication Protocol.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)
Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)
Eugénio Silva, Miguel Correia. Implementação de um Sistema de Ficheiros em Nuvem utilizando Criptografia Homomórfica.
In INForum 2016, Sep. 2016.
M. Correia. Critical Information Infrastructure Protection: Urgent
vs. Important. 2012 Workshop on Cyber Security and Global Affairs
and Global Security Forum, Barcelona, Jun. 2012 (pdf)
M. Correia. Software Execution Protection in the Cloud, Keynote at
1st European Workshop on Dependable Cloud Computing (EWDCC 2012), Sibiu,
Romania, May 8th 2012 (pdf)
M. Correia, D. G. Ferro, F. Junqueira, M. Serafini. Practical
Hardening of Crash-Tolerant Systems. Poster at the 23rd ACM
Symposium on Operating Systems Principles (SOSP), October 2011.
A. N. Bessani, V. V. Cogo, M. Correia, P. Costa, M. Pasin, F. Silva,
L. Arantes, O. Marin, P. Sens, J. Sopena. Making Hadoop MapReduce
Byzantine Fault-Tolerant. In Proceedings of the International
Conference on Dependable Systems and Networks (DSN), (fast abstract)
July 2010. (pdf)
A. Bessani, M. Correia, P. Verissimo. Intrusion Tolerance: The
killer application for BFT Protocols (?). BFTW3: Why? When? Where?
Workshop on Theory and Practice of Byzantine Fault Tolerance. Elche,
Spain, September 22, 2009 (pdf)
Ibéria Medeiros, Miguel Correia. Finding Vulnerabilities in
Software Ported from 32 to 64-bit CPUs.
In Proceedings of
the International Conference on Dependable Systems and Networks (DSN), (fast
abstract) Jun-Jul
2009. (pdf)
Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung. From
Crash to Byzantine Consensus with 2f + 1 Processes.
In Proceedings of
the International Conference on Dependable Systems and Networks (DSN), (fast
abstract) Jun-Jul
2009. (pdf)
Giuliana Santos Veronese,
Miguel Correia, Lau Cheuk Lung, Alysson N. Bessani. Byzantine Fault
Tolerance with a Spinning Primary. Poster at European Conference on
Computer Systems (EuroSys 2009). April 2009.
Giuliana Santos Veronese,
Miguel Correia, Lau Cheuk Lung. Byzantine 2f+1 State Machine
Replication with COTS Components. Poster at European Conference on
Computer Systems (EuroSys 2008). April 2008.
Giuliana Santos Veronese,
Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. On the
Effects of Finite Memory on Intrusion-Tolerant Systems. In Proceedings of the 13th IEEE Pacific Rim
Dependable Computing Conference, pages 401--404. December 2007 (pdf)
Alysson Neves Bessani,
Miguel Correia, Henrique Moniz, Nuno F. Neves, Paulo Verissimo. When 3 f +1 is not Enough: Tradeoffs for Decentralized
Asynchronous Byzantine Consensus. 21st International Symposium on
Distributed Computing (DISC 2007). September 2007. (pdf)
Alysson Neves Bessani,
Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo.
Protecting CRUTIAL Things. Fast Abstract at the International Conference on Dependable Systems and Networks,
June 2007.
Pan Jieke, João Redol, Miguel Correia. Specification-Based
Intrusion Detection System for Carrier Ethernet. In
International Conference on Web Information Systems and
Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)
Alysson Neves Bessani,
Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. A
System for Protecting CRUTIAL Things. EuroSys 2007 posters (pdf)
Alysson Neves Bessani and Miguel Correia
and Joni da Silva Fraga and L. C. Lung. Brief Announcement:
Decoupled Quorum-based Byzantine-resilient Coordination in Open
Distributed Systems. 20th International Symposium on Distributed
Computing (DISC 2006). September 2006. (pdf)
Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo,
Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop
on Future Directions in Distributed Computing: Survivability - Obstacles and
Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)
Miguel Correia,
Nuno Ferreira Neves,
Lau Lung, Paulo Veríssimo, Byzantine-Resistant Consensus based on a
Novel Approach to Intrusion Tolerance, Fast abstract in Supplement of the
10th Pacific Rim International Symposium on Dependable Computing, March 2004. (pdf)
M. Correia, N. F. Neves, L. C. Lung, P. Veríssimo.
A Wormhole-based
Intrusion-Tolerant Group Communication System - WIT-GCS. The 5th Cabernet
Plenary Workshop, November 2003. (pdf) (the
system was later renamed to Worm-IT -- see journal papers above)
M. Correia, L. C. Lung, N. F. Neves, P. Veríssimo.
A Byzantine-Resilient
Protocol using the TTCB. Fast abstract. Supplement of the Fourth European Dependable Computing Conference. Toulouse,
France, October 2002.
(zipped ps)
(ps)
A. Casimiro and M. Correia. Recent Advances on the Timely Computing Base
Model. Fast Abstract at the International Conference on Dependable Systems and Networks, Göteborg, Sweden, June 2001.
(pdf)
Miguel Correia. Including Confidentiality in a Multimedia QoS Adaptation Architecture
(extended abstract). 5th CaberNet Radicals Workshop, Valadares, Porto, Portugal, 5-8 July
1998. (html)
8. thesis
Miguel Correia.
Intrusion Tolerance based on Architectural Hybridization. PhD
Thesis. Faculdade de Ciências da Universidade de Lisboa, Lisboa, Dezembro de
2003
Miguel Correia. Sincronização Multimédia Intrínseca em Sistemas
Distribuídos.
Tese de Mestrado. Instituto Superior Técnico, Lisboa, November 1995 (Intrinsic Multimedia Synchronization in Distributed Systems, MsC Thesis, in portuguese)
|