| | Other publications
by topic
Mobile Security and Dependability
Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia. Anonymous Trusted Data Relocation for TEEs. In 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), June 2022 (pdf).
Diogo Vaz, David R. Matos, Miguel L. Pardal, and Miguel Correia. MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks. In Proceedings of MobiQuitous 2020 (pdf).
Nuno O. Duarte, Sileshi D. Yalew, Nuno Santos, and Miguel Correia. Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions. In Proceedings of MobiQuitous 2018. (pdf)
Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017.
(pdf)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid.
In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017.
(pdf)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications.
In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017.
(pdf)
Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices.
In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017.
(pdf)
Henrique Moniz, Nuno F. Neves, M.
Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc
Networks. IEEE Transactions on Mobile Computing, vol. 12,
n. 12, Dec. 2013. (pdf)
Henrique Moniz, Nuno Neves, Miguel
Correia, Paulo Verissimo. Randomization Can Be a Healer:
Consensus with Dynamic Omission Failures, Distributed Computing,
24(3-4), pp. 165-175, 2011.
Henrique Moniz, Nuno Ferreira Neves, Miguel
Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks,
Proceedings of the International Conference on Dependable Systems and
Networks (DSN), Chicago, USA, June 2010. (pdf)
Henrique Moniz, Nuno F. Neves, Miguel
Correia, Paulo Verissimo. Randomization Can Be a Healer:
Consensus with Dynamic Omission Failures. In Proceedings of
the 23rd International Symposium on Distributed Computing (DISC).
September 2009. (pdf)
Best Student Paper Award
Henrique Moniz, Alessandra Tedeschi,
Nuno Ferreira Neves, Miguel Correia. A Distributed Systems
Approach to Airborne Self-Separation. In Computational
Models, Software Engineering and Advanced Technologies in Air
Transportation: Next Generation Applications, edited by Li Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI Global, October 2009. (pdf)
Henrique Moniz, Nuno Ferreira Neves, Miguel Correia,
António Casimiro, Paulo Verissimo. Intrusion Tolerance in
Wireless Environments: An Experimental Evaluation. In
Proceedings of the 13th IEEE Pacific Rim Dependable Computing
Conference, pages 357-364. December 2007 (pdf)
H. Moniz and N. F. Neves and M.
Correia and P. Veríssimo. Experimental Comparison of Local and
Shared Coin Randomized Consensus Protocols. In Proceedings of
the 27th IEEE Symposium on Reliable Distributed Systems. pages
235-244, Leeds, UK, October 2006 (pdf)
H. Moniz and N. F. Neves and M.
Correia and P. Veríssimo. Randomized Intrusion-Tolerant
Asynchronous Services. In Proceedings of the International
Conference on Dependable Systems and Networks (DSN), pages 568-577,
June 2006. (pdf)
Secure and Dependable Communications
Cláudio Correia, Miguel Correia, Luís Rodrigues. Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, Nov. 2023
Ricardo Moura, Ricardo Lopes, David R. Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: using multiple and diverse ciphers for stronger secure channels. Computers & Security Volume 132, September 2023 (pdf, software).
Ricardo Moura, David Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: Secure communication channel with cipher suite diversity. In 35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference, 2020 (pdf).
Erick Lavoie, Laurie J. Hendren, Frederic Desprez, and Miguel Correia. Pando: Personal Volunteer Computing in Browsers. In Proceedings of the 2019 ACM/IFIP/USENIX International Middleware Conference, Dec. 2019. (pdf, software)
Erick Lavoie, Laurie Hendren, Frederic Desprez, and Miguel Correia. Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems - SASO 2019, June 2019. (pdf)
Naercio Magaia, Carlos Borrego, Paulo Pereira, and Miguel Correia.
ePRIVO: An enhanced PRIvacy-preserVing Opportunistic routing protocol for Vehicular Delay-Tolerant Networks.
IEEE Transactions on Vehicular Technology, 67(11), pp. 11154-11168, 2018 (pdf)
Naercio Magaia, Zhengguo Sheng, Paulo Pereira, and Miguel Correia.
REPSYS: A robust and distributed incentive scheme for in-network caching and dissemination in Vehicular Delay-Tolerant Networks. IEEE Wireless Communications Magazine, 25(3): 65-71, 2018 (pdf)
André Joaquim, Miguel Pardal, Miguel Correia. Vulnerability-Tolerant Transport Layer Security.
In Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS), Dec. 2017. (pdf, software)
Naércio Magaia, Paulo Pereira, Miguel Correia. REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks.
In Proceedings of the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2017), Nov. 2017. (pdf)
Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks.
In Proceedings of the IFIP Networking Conference, Jun. 2017. (pdf)
Erick Lavoie, Laurie Hendren, and Miguel Correia. Xor-Based Topology Management Beyond Kademlia.
In Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), Sep. 2017.
(pdf)
Diogo Raposo, Miguel Pardal, Luís Rodrigues, Miguel Correia. MACHETE: Multi-path Communication for Security.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software, software)
Alysson Bessani, Nuno F. Neves, Paulo Veríssimo, Wagner Dantas, Alexandre Fonseca,
Rui Silva, Pedro Luz, Miguel Correia. JITeR: Just-in-time application-layer routing. Computer Networks,
Volume 104, Pages 122-136, 20 July 2016. (pdf, preprint, software)
Karan Balu, Miguel Pardal, Miguel Correia. DARSHANA: Detecting Route Hijacking For Communication Confidentiality.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)
André Joaquim, Miguel Pardal, Miguel Correia. vtTLS: A Vulnerability-Tolerant Communication Protocol.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)
Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia,
A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks.
Applied Soft Computing, 30, pp. 104-112, 2015.
(online).
Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia,
Betweenness centrality in delay tolerant networks: A survey.
Ad Hoc Networks, 33, pp. 284-305, 2015.
Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical
Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)
N. Magaia, P. R. Pereira, M. Correia. Nodes'
Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of
CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)
N. Magaia, P. R. Pereira, M. Correia. Selfish
and Malicious Behavior in Delay Tolerant Networks. In Proceedings of
Future Network and Mobile Summit 2013, July 2013 (pdf)
Wagner Saback Dantas, Alysson
Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving
the Timeliness and Reliability of Control Traffic in Utility Networks. In
Proceedings of the Workshop on Hot Topics in System Dependability (HotDep),
Jun 2009. (pdf)
Critical Infrastructure Protection
Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia. FingerCI: Writing Industrial Process Specifications from Network Traffic. International Journal of Critical Infrastructure Protection, to appear (pdf).
Filipe Apolinário, João Guiomar, Nelson Escravana, Seven Hrastnik, Éric Hervé, Miguel Correia and Miguel L. Pardal. ComSEC: Secure communications for baggage handling systems. 3rd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection - CSP4CIP (with ESORICS 2022), Sep. 2022.
Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia. FingerCI: Generating Specifications for Critical Infrastructures. 37th Annual ACM Symposium on Applied Computing, April 2022.(pdf).
Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical
Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)
I. Medeiros, N. F. Neves, M. Correia.
Securing Energy Metering Software with Automatic Source Code Correction.
In Proceedings of the 11th IEEE International Conference on Industrial
Informatics (INDIN), Jul. 2013 (pdf)
Paulo Sousa, Alysson Neves
Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo.
Highly Available Intrusion-Tolerant Services with Proactive-Reactive
Recovery. IEEE Transactions on Parallel and Distributed Systems,
vol. 21, n. 4, pp. 452–465, April 2010. (pdf)
Alysson Neves
Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo.
The CRUTIAL Way of Critical Infrastructure Protection. IEEE
Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)
Wagner Saback Dantas, Alysson
Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving
the Timeliness and Reliability of Control Traffic in Utility Networks. In
Proceedings of the Workshop on Hot Topics in System Dependability (HotDep),
Jun 2009. (pdf)
Paulo Sousa, Alysson N. Bessani, Wagner S.
Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant
Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of
the International Conference on Dependable Systems and Networks (DSN), Jul
2009. (pdf)
Paulo Veríssimo, Alysson Bessani,
Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing
Modular and Redundant Cyber Architectures for Process Control:
Lessons learned. In Proceedings
of the 42nd Hawaii International Conference for the Systems Sciences
(HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)
P. Verissimo, N. F. Neves, M.
Correia, Y. Deswarte, A. Abou El
Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for
Critical Information Infrastructures.
In Architecting Dependable Systems V,
R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS
5135, pp 1-27. Springer Verlag, 2008. (pdf)
Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL
reference critical information infrastructure architecture: a
blueprint. International Journal of System of Systems
Engineering, vol. 1, n. 1/2, pp 78-95, 2008.
(selected as one of the best papers
from the 2006 First International Workshop on Critical
Information Infrastructures Security) (abstract) (pdf)
Paulo Sousa, Alysson Neves
Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Resilient Intrusion Tolerance through Proactive and Reactive
Recovery. In Proceedings of the 13th IEEE Pacific Rim
Dependable Computing Conference, pages 373--380. December 2007 (pdf)
P. Veríssimo, N. F. Neves and
M. Correia. CRUTIAL: The Blueprint of a Reference Critical
Information Infrastructure Architecture. In CRITIS'06 1st
International Workshop on Critical Information Infrastructures
Security, pages 1-14, Samos Island, Greece, August 30 -
September 2, 2006 (pdf)
Alysson Neves Bessani and Paulo
Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo
Veríssimo.
Intrusion-Tolerant Protection for Critical Infrastructures.
Technical Report DI/FCUL TR-07-8. April
2007 (abstract/pdf)
Other Byzantine Fault-Tolerant Systems / Algorithms
Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Automatic Generation of Distributed Algorithms with Generative AI. Proceedings of the 53th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Disrupt track (pdf)
Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Synthesis of Fault-Tolerant Reliable Broadcast Algorithms with Reinforcement Learning. IEEE Access 11: 62394-62408, 2023 (pdf).
Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís Rodrigues, Miguel Correia. Fireplug: Flexible and Robust N-version Geo-Replication of Graph Databases.
In Proceedings of the 32nd International Conference on Information Networking (ICOIN), Jan. 2018. (pdf)
Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos.
In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)
Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing.
In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)
A. F. Luiz, L. C. Lung, M. Correia,
MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on
Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)
F. Dettoni, L. C. Lung, M. Correia, A. F.
Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin
Virtual Machines. In Proceedings of the 8th IEEE Symposium on
Computers and Communications (ISCC), Jul. 2013 (pdf)
Miguel Correia, Daniel G. Ferro, Flavio
Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems,
In Proceedings of the Usenix Annual Technical Conference (ATC), 2012
(pdf)
Xavier Vilaça, João Leitão, Miguel
Correia, Luís Rodrigues. N-party BAR Transfer. In
Proceedings of the 15th International Conference On Principles of
Distributed Systems (OPODIS), Dec. 2011 (pdf)
Aldelir Luiz, Lau Cheuk Lung and Miguel
Correia. Byzantine Fault-Tolerant Transaction Processing for
Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA).
July 2011 (pdf)
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA:
Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of
the 12th IEEE
International High Assurance Systems Engineering Symposium (HASE).
November 2010. (pdf)
Giuliana Santos Veronese,
Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One’s
Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the
30th IEEE Symposium on Reliable Distributed
Systems (SRDS). September 2009. (pdf)
A. N. Bessani, P. Sousa, M. Correia.
Active Quorum Systems. In Proceedings of the Workshop on Hot
Topics in System Dependability (HotDep), October 2010. (pdf)
Coordination Services
Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service.
In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space.
IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug.
2009. (pdf)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using
Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed
Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract) (pdf)
Alysson Neves Bessani, Eduardo Pelison Alchieri, Miguel Correia,
Joni Silva Fraga. DepSpace: a Byzantine fault-tolerant
coordination service. ACM SIGOPS Operating Systems Review, vol.
42 , issue 4, pages 163-176, May 2008. Appeared also in the Proceedings
of the European Conference on Computer Systems (EuroSys 2008). April
2008. (abstract)
(pdf) (software)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Decoupled Quorum-based
Byzantine-Resilient Coordination in Open Distributed Systems.
In Proceedings of the 6th IEEE International Symposium on Network
Computing and Applications (NCA), pages 231-238, July 2007. (pdf)
Wagner Saback Dantas, Alysson
Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating
Byzantine Quorum Systems. In Proceedings of the 28th IEEE
Symposium on Reliable Distributed Systems (SRDS), pages
253-264. October
2007. (pdf)
A.N.Bessani and M.Correia and
J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine
Processes using Policy-Enforced Tuple Spaces. In Proceedings
of the 26th International Conference on Distributed Computing
Systems (ICDCS), July 2006. (pdf)
Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and
L. C. Lung. Towards a Dependable Tuple Space.
Technical Report DI/FCUL TR-06-4.
April 2006. (abstract)
(pdf)
Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and
L. C. Lung. Brief Announcement: Decoupled Quorum-based
Byzantine-resilient Coordination in Open Distributed Systems.
20th International Symposium on Distributed Computing (DISC 2006).
September 2006. (pdf)
Fault Monitoring and Diagnosis
Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi,
Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based
Diagnosis through a Distributed Monitor System. IEEE
Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp.
266-279, Oct-Dec, 2007 (abstract)
(pdf)
Gunjan Khanna, Mike Yu Cheng,
Padma Varadharajan, Miguel P. Correia, Paulo J. Verissimo, Saurabh
Bagchi. Automated Monitor Based Diagnosis In Distributed System. Technical Report Purdue Univ. TR-ECE-05-13 (pdf)
Grid Computing
Fábio Favarim, Joni Fraga, Lau
C. Lung, Miguel Correia. GridTS: A New Approach for Fault
Tolerant Scheduling in Grid Computing. In Proceedings of the
6th IEEE International Symposium on Network Computing and
Applications (NCA), pages 187-194, July 2007. (pdf)
Fábio Favarim, Joni Fraga, Lau
C. Lung, Miguel Correia, João F. Santos. Exploiting Tuple Spaces
to Provide Fault-Tolerant Scheduling on Computational Grids.
In Proceedings of the 10th IEEE International Symposium on Object
and component-oriented Real-time distributed Computing (ISORC),
pages 403-411.
May 2007. (pdf)
F. Favarim and L. C. Lung and
J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser
Computational Grids based on Tuple Spaces. In International
Workshop on Dependability in Service-oriented Grids (WODSOG).
October 1st, 2006, Leeds, UK (pdf)
Distributed Multimedia
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. QoS control:
an application integrated framework. In Proceedings of the
1st IEEE International Conference on ATM (ICATM´98), Colmar,
France, June 1998. (abstract)(ps.gz)
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. An
architecture for dynamic multimedia QoS control. In
Proceedings of the 7th IFIP/ICCC Conference on Information Networks
and Data Applications (INDC´98), Aveiro, Portugal, June 1998. (abstract) (ps.gz)
João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. Integrated
dynamic QoS control for multimedia applications. In
International Symposium SYBEN'98, Broadband Networks and Multimedia
Systems, Zurich, Switzerland, May 1998. (abstract) (ps.gz)
Miguel Correia, Paulo Pinto.
Low-Level Multimedia Synchronization Algorithms on Broadband
Networks. ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract)
(ps.gz)
copyright notice
This material is presented to ensure timely
dissemination of scholarly and technical work. Copyright and all
rights therein are retained by authors or by other copyright holders:
IEEE,
ACM,
Springer-Verlag,
Elsevier,
Oxford University Press.
All persons copying this information are expected to adhere to the
terms and constraints invoked by each author’s copyright. In most
cases, these works may not be reposted without the explicit
permission of the copyright holder.
|