miguel pupo correia           
 

publications

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

1. journal papers:

David R. Matos, Miguel L. Pardal, António Rito Silva, Miguel Correia. uVerum: Intrusion Recovery for Microservice Applications. IEEE Access, to appear (pdf, software).

Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Synthesis of Fault-Tolerant Reliable Broadcast Algorithms with Reinforcement Learning. IEEE Access 11: 62394-62408, 2023 (pdf).

Ricardo Moura, Ricardo Lopes, David R. Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: using multiple and diverse ciphers for stronger secure channels. Computers & Security Volume 132, September 2023 (pdf, software).

Rafael Belchior, Luke Riley, Thomas Hardjono, André Vasconcelos, Miguel Correia. Do You Need a Distributed Ledger Technology Interoperability Solution?. ACM Distributed Ledger Technologies: Research and Practice, Vol. 2, N. 1, March 2023 (pdf).

Daniel Andrade, João Silva, Miguel Correia. SRX - Secure Data Backup and Recovery for SGX Applications. IEEE Access, Vol. 10, pp. 35901-35918, 2022 (pdf).

Sérgio Guerreiro, João F. Ferreira, Tiago Fonseca, Miguel Correia. Integrating an academic management system with blockchain: A case study. Blockchain: Research and Applications, Vol. 3, N. 4, Dec. 2022 (pdf)

Rafael Belchior, Sérgio Guerreiro, André Vasconcelos, Miguel Correia. A Survey on Business Process View Integration: Past, Present, and Future Applications to Blockchain. Business Process Management Journal, Vol. 54, Issue 8, November 2022 (pdf)

Diogo Vaz, David R. Matos, Miguel L. Pardal, and Miguel Correia. MIRES: Intrusion Recovery for Applications based on Backend-as-a-Service. IEEE Transactions on Cloud Computing, accepted for publication, 2022 (pdf).

David Matos, Miguel Pardal, Miguel Correia. Sanare: Pluggable Intrusion Recovery for Web Applications. IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 20, N. 1, pp. 590-605, Jan.-Feb. 2023 (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. IEEE Transactions on Reliability, volume 71, issue 2, pp 1033-1056, June 2022 (pdf)

Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. A Survey on Blockchain Interoperability: Past, Present, and Future Trends. ACM Computing Surveys, Vol. 54, Issue 8, November 2022 (abstract, pdf)

Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Hermes: Fault-tolerant middleware for blockchain interoperability. Future Generation Computer Systems. Volume 129, Pages 236-251, April 2022. (abstract, pdf)

Cláudio Correia, Miguel Correia, Luís Rodrigues. Omega: a Secure Event Ordering Service for for the Edge. IEEE Transactions on Dependable and Secure Computing (TDSC), early access May 2021 (pdf)

Ahad Niknia, Miguel Correia, Jaber Karimpour. Secure Cloud-of-Clouds Storage with Space-Efficient Secret Sharing. Journal of Information Security and Applications, Volume 59, June 2021 (pdf, ePrint)

Sérgio Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, Miguel Correia, Pedro Sousa. Decentralized Business Process Control using Blockchain - An experience report from two applications: Food Supply Chain and Car Registration. Enterprise Modelling and Information Systems Architectures, Volume 15, 2020 (pdf)

Ray Neiheiser, Luciana Rech, Manuel Bravo, Luis Rodrigues and Miguel Correia. Fireplug: Efficient and Robust Geo-Replication of Graph Databases. IEEE Transactions on Parallel and Distributed Systems, vol. 31 , n. 8 , Aug. 2020 (pdf)

Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS. IEEE Transactions on Reliability, 68(3): 1168-1188, 2019 (pdf)

Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, and Marco Vieira. An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. Computing, 101(2): 161-185, February 2019 (pdf)

Naercio Magaia, Carlos Borrego, Paulo Pereira, and Miguel Correia. ePRIVO: An enhanced PRIvacy-preserVing Opportunistic routing protocol for Vehicular Delay-Tolerant Networks. IEEE Transactions on Vehicular Technology, 67(11), pp. 11154-11168, 2018 (pdf)

Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, and Marco Vieira. Benchmarking Static Analysis Tools for Web Security. IEEE Transactions on Reliability, 67(3): 1159-1175, 2018 (pdf)

Naercio Magaia, Zhengguo Sheng, Paulo Pereira, and Miguel Correia. REPSYS: A robust and distributed incentive scheme for in-network caching and dissemination in Vehicular Delay-Tolerant Networks. IEEE Wireless Communications Magazine, 25(3): 65-71, 2018 (pdf)

Pedro Costa, Fernando Ramos, and Miguel Correia. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, vol. 4(4) pp. 74-82, July/August 2017. (pdf)

Hylson V. Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza. State machine replication in containers managed by Kubernetes. Journal of Systems Architecture, Volume 73, Pages 1-60, Feb. 2017. (pdf)

Alysson Bessani, Nuno F. Neves, Paulo Veríssimo, Wagner Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia. JITeR: Just-in-time application-layer routing. Computer Networks, Volume 104, Pages 122-136, 20 July 2016. (pdf, preprint, software)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54-69, March 2016. (pdf, software)

Hylson Vescovi Netto, Lau Cheuk Lung, Tulio Alberton Ribeiro, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. ACM Performance Evaluation Review, Volume 43, Issue 3, Pages 21-24, Dec. 2015. (pdf)

Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia, Betweenness centrality in delay tolerant networks: A survey. Ad Hoc Networks, 33, pp. 284-305, 2015. (pdf)

Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia, A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks. Applied Soft Computing, 30, pp. 104-112, 2015. (pdf).

A. F. Luiz, L. C. Lung, M. Correia, MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Transactions on Storage, vol. 9, n. 4, Nov. 2013. (pdf, software)

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf, software)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf, software)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud, IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011. (abstract/pdf)

Henrique Moniz, Nuno Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures, Distributed Computing, 24(3-4), pp. 165-175, 2011.

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf, software)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452-465, April 2010. (pdf)

J. Antunes and N. F. Neves and M. Correia and P. Veríssimo and R. Neves. Vulnerability Detection with Attack Injection. IEEE Transactions on Software Engineering, vol. 36, n. 3, pp. 357-370, March 2010. (pdf, software)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space. IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug. 2009. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract, pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. The CRUTIAL Way of Critical Infrastructure Protection. IEEE Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract, pdf)

Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL reference critical information infrastructure architecture: a blueprint. International Journal of System of Systems Engineering, vol. 1, n. 1/2, pp 78-95, 2008. (selected as one of the best papers from the 2006 First International Workshop on Critical Information Infrastructures Security) (abstract, pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007 (abstract, pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007 (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract, pdf, software)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 Page(s):1120 - 1131 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237--249, March 2005. (pdf)

    edited

Operating Systems Review, vol. 48, n. 2, 2014, Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing (with Neeraj Mittal) (online)

Operating Systems Review, July 2013, Column: Selected extended papers from DISCCO 2012 first international workshop on dependability issues in cloud computing (with Neeraj Mittal) (online)

2. books

Francisco Rocha, Salvador Abreu, Miguel Correia. The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud, IEEE Computer Society Press, March 2013. (Amazon)

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese), FCA editores. 2a Edição Atualizada e Aumentada, Set. 2017. (FCA)

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese), FCA editores. Set. 2010.

    edited

Aris Gkoulalas-Divanis, Miguel P. Correia, Mirco Marchetti, and Dimiter R. Avresky (Eds.). Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE. ISBN 978-1-5386-7659-2 ISBN 978-1-5386-7658-5 (online)

Aris Gkoulalas-Divanis, Miguel P. Correia and Dimiter R. Avresky (Eds.). Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). IEEE. ISBN 978-1-5386-1465-5 ISBN 978-1-5386-1464-8 (online)

Miguel Correia and Neeraj Mittal (Eds.). 2013. Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing. ACM, New York, NY, USA. ISBN 978-1-4503-2248-5 (online)

Miguel P. Correia. Proceedings Ninth European Dependable Computing Conference - EDCC 2012. ISBN 978-0-7695-4671-1 (online)

Luís Soares Barbosa e Miguel Correia, editores. Actas do INForum - Simpósio de Informática 2010. Braga, Setembro de 2010.

Miguel Correia and Jean-Phillipe Martin (eds.). Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems. ACM International Conference Proceedings Series. ISBN 978-1-59593-986-9 (online)

Miguel Correia and Nuno F. Neves (eds.). Proceedings of the Workshop on Recent Advances on Intrusion-Tolerant Systems. (online)

    book chapters

Arnaldo Gouveia and Miguel Correia. XGBoost(ing) Network Intrusion Detection. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Arnaldo Gouveia and Miguel Correia. Deep Learning for Network Intrusion Detection: An Empirical Assessment. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Gil Mouta, Miguel L. Pardal, João Bota, Miguel Correia. SPATIO: end-uSer Protection Against ioT IntrusiOns. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Miguel Correia. From Byzantine Consensus to Blockchain Consensus. In Essentials of Blockchain Technology, Chapter 3, pp. 40-79, CRC Press, 2020. (pdf)

Tiago Rosado, André Vasconcelos, Miguel Correia. A Blockchain Use Case for Car Registration. In Essentials of Blockchain Technology, Chapter 10, pp. 204-233, CRC Press, 2020. (pdf)

Luís Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. Detecting Botnets and Unknown Network Attacks in Big Traffic Data. In Botnets: Architectures, Countermeasures, and Challenges, Chapter 7, CRC Press, 2020. (pdf)

Luis Filipe Dias and Miguel Correia. Big Data Analytics for Intrusion Detection: An Overview. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security, ed. Padmavathi Ganapathi and D. Shanmugapriya, IGI Global, 2020. (pdf)

Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)

Miguel Correia. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud (invited chapter). In Euro-Par 2013: Parallel Processing Workshops, Lecture Notes in Computer Science Volume 8374, pp 95-104, 2014 (pdf)

Henrique Moniz, Alessandra Tedeschi, Nuno Ferreira Neves, Miguel Correia. A Distributed Systems Approach to Airborne Self-Separation. In Computational Models, Software Engineering and Advanced Technologies in Air Transportation: Next Generation Applications, edited by Li Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI Global, October 2009. (pdf)

Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa. Intrusion-Resilient Middleware Design and Validation. In Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), pages 615-678, Emerald, 2009. (pdf)

P. Verissimo, N. F. Neves, M. Correia, Y. Deswarte, A. Abou El Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for Critical Information Infrastructures. In Architecting Dependable Systems V, R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS 5135, pp 1-27. Springer Verlag, 2008. (pdf)

Miguel P. Correia. Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos. V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade Brasileira de Computação, Setembro de 2005 (pdf) (slides, versão extendida, also as DI-FCUL tech report)

Paulo Veríssimo and Nuno Ferreira Neves and Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer Verlag, 2003. An extended version is available as DI/FCUL TR03-05 (pdf)

3. conference papers

2023

Cláudio Correia, Miguel Correia, Luís Rodrigues. Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, Nov. 2023

Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Automatic Generation of Distributed Algorithms with Generative AI. Proceedings of the 53th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Disrupt track (pdf)

Rodrigo Marques Silva, Cláudio Jose Correia, Miguel Correia, Luís Rodrigues. Deduplication vs Privacy Tradeoffs in Cloud Storage. 38th Annual ACM Symposium on Applied Computing, Tallinn, Estonia, March 2023 (pdf)

2022

André Cordeiro, André Vasconcelos, Miguel Correia. A Catalog of Security Patterns. 29th Conference on Pattern Languages of Programs, Oct. 2022 (pdf, patterns)

Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia. Anonymous Trusted Data Relocation for TEEs. In 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), June 2022 (pdf).

2021

Pedro Marques, Luis Filipe Dias and Miguel Correia. CyberVTI: Cyber Visualization Tool for Intrusion Detection. In 20th IEEE International Symposium on Network Computing and Applications, Nov. 2021 (pdf).

Mara Caldeira and Miguel Correia. Blockchain Address Transparency with DNS. In Proceedings of the 26th IEEE Symposium on Computers and Communications, September 2021 (pdf).

Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Enabling Cross-Jurisdiction Digital Asset Transfer. In Proceedings of the 2021 IEEE International Conference on Services Computing, September 2021 (pdf).

Mihail Brinza, Miguel Correia, João Pereira. Virtual Static Security Analyzer for Web Applications. In Proceedings of Trustcom 2021, August 2021 (pdf, software).

2020

Diogo Vaz, David R. Matos, Miguel L. Pardal, and Miguel Correia. MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks. In Proceedings of MobiQuitous 2020 (pdf).

Tiago Fernandes, Luis Dias and Miguel Correia. C2BID: Cluster Change-Based Intrusion Detection. In Proceedings of Trustcom 2020, December 2020 (pdf).

Luis Dias, Simão Valente and Miguel Correia. Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf, software).

Arnaldo Gouveia and Miguel Correia. Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Network Flows and Performance Counters against Cryptojacking. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Filipe Martins, David Matos, Miguel Pardal and Miguel Correia. Recoverable Token: Recovering from Intrusions against Digital Assets in the Ethereum Blockchain. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Alexandra Figueiredo, Tatjana Lide, David Matos and Miguel Correia. MERLIN: Multi-Language Web Vulnerability Detection. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf, software).

Fábio Gomes and Miguel Correia. Cryptojacking Detection with CPU Usage Metrics. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Diogo Serranito, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. Blockchain Ecosystem for Verifiable Qualifications. In Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, September 2020 (pdf, video, software).

Cláudio Correia, Luis Rodrigues, Miguel Correia. Omega: a Secure Event Ordering Service for the Edge. In Proceedings of the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June/July 2020 (pdf, video).

Rafael Belchior, André Vasconcelos, Miguel Correia. Towards Secure, Decentralized, and Automatic Audits with Blockchain. In Proceedings of the European Conference on Information Systems (ECIS), June 2020 (pdf).

Ricardo Moura, David Matos, Miguel L. Pardal, Miguel Correia. MultiTLS: Secure communication channel with cipher suite diversity. In 35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference, 2020 (pdf, ePrint).

2019

Erick Lavoie, Laurie J. Hendren, Frederic Desprez, and Miguel Correia. Pando: Personal Volunteer Computing in Browsers. In Proceedings of the 2019 ACM/IFIP/USENIX International Middleware Conference, Dec. 2019. (pdf, software)

Luís Dias, Hélder Reia, Rui Neves, and Miguel Correia. OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zoom. In Proceedings of the 13th International Conference on Network and System Security, Sapporo, Japan, Dec. 2019. (pdf, software)

Rafael Belchior, Miguel Correia, and André Vasconcelos. JusticeChain: Using Blockchain to Protect Justice Logs. 27th International Conference on Cooperative Information Systems - CoopIS 2019. (pdf)

Carlos Faria and Miguel Correia. BlockSim: Blockchain Simulator. In IEEE Blockchain Symposium, 2019. (pdf, software)

Erick Lavoie, Laurie Hendren, Frederic Desprez, and Miguel Correia. Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems - SASO 2019, June 2019. (pdf)

2018

David Matos, Miguel Pardal, Georg Carle, and Miguel Correia. RockFS: Cloud-backed File System Resilience to Client-Side Attacks. In Proceedings of the 2018 ACM/IFIP/USENIX International Middleware Conference, Dec. 2018. (pdf, video, software)

Nuno O. Duarte, Sileshi D. Yalew, Nuno Santos, and Miguel Correia. Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions. In Proceedings of MobiQuitous 2018. (pdf)

Filipe Apolinário, Miguel L. Pardal, and Miguel Correia. S-Audit: Efficient Data Integrity Verification for Cloud Storage. In Proceedings of IEEE TrustCom, July 2018. (pdf, software)

Luís Sacramento, Ibéria Medeiros, João Bota, and Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. In Proceedings of IEEE TrustCom, July 2018. (pdf)

Miguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Yalew and Miguel Correia. Introspection for ARM TrustZone with the ITZ Library. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability, and Security, July 2018. (pdf, software)

Hylson Vescovi Netto, Aldelir Fernando Luiz, Miguel Correia, Luciana de Oliveira Rech, Caio Pereira Oliveira. Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes. In Proceedings of the 23rd IEEE International Symposium on Computers and Communications, June 2018 Microsoft Award - Best local student paper (pdf)

Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís Rodrigues, Miguel Correia. Fireplug: Flexible and Robust N-version Geo-Replication of Graph Databases. In Proceedings of the 32nd International Conference on Information Networking (ICOIN), Jan. 2018. (pdf)

2017

André Joaquim, Miguel Pardal, Miguel Correia. Vulnerability-Tolerant Transport Layer Security. In Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS), Dec. 2017. (pdf, software)

David Matos, Miguel Pardal, and Miguel Correia. Rectify: Black-Box Intrusion Recovery in PaaS Clouds. In Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference, Dec. 2017. (pdf, software)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017. (pdf)

Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Naércio Magaia, Paulo Pereira, Miguel Correia. REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks. In Proceedings of the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2017), Nov. 2017. (pdf)

Erick Lavoie, Laurie Hendren, and Miguel Correia. Xor-Based Topology Management Beyond Kademlia. In Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), Sep. 2017. (pdf)

Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia and Marco Vieira. On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. In Proceedings of the 13th European Dependable Computing Conference (EDCC 2017), Sep. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Demonstrating a Tool for Injection Attack Prevention in MySQL. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2017. (pdf)

Diogo Frazão, João Redol, and Miguel Correia. PARADISE: Modular Click Fraud Detection. In 2017 European Security Conference: Cybersecurity Analytics, Jun. 2017.

Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. In Proceedings of the IFIP Networking Conference, Jun. 2017. (pdf)

Arnaldo Gouveia, Miguel Correia. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. In Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), Jun. 2017. (pdf)

Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf, software) Best Student Paper Award

2016

David Matos, Miguel Correia. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)

Diogo Raposo, Miguel Pardal, Luís Rodrigues, Miguel Correia. MACHETE: Multi-path Communication for Security. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software, software)

Karan Balu, Miguel Pardal, Miguel Correia. DARSHANA: Detecting Route Hijacking For Communication Confidentiality. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)

Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Christine Blakemore, João Redol, Miguel Correia. Fingerprinting for Web Applications: from Devices to Related Groups. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities. In Proceedings of the IEEE International Symposium on Software Testing and Analysis (ISSTA), Jul. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Equipping WAP with WEAPONS to Detect Vulnerabilities. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2016. (pdf, software)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf, software)

Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. Hacking the DBMS to Prevent Injection Attacks. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CoDASPy), March 2016. (pdf)

Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos. In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)

2015

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015. (pdf)

Dário Nascimento, Miguel Correia. Shuttle: Intrusion Recovery for PaaS. In Proceedings of the 35th International Conference on Distributed Computing Systems (ICDCS), Jun.-Jul. 2015 (pdf, slides, video, software)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

2014

A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia, N. Pasin, P. Verissimo. SCFS: a Shared Cloud-backed File System. In Proceedings of Usenix Annual Technical Conference (ATC), 2014. (pdf, software, software)

I. Medeiros, N. F. Neves, M. Correia. Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives. In Proceedings of 23rd International World Wide Web Conference, 2014. (pdf, software)

2013

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

F. Dettoni, L. C. Lung, M. Correia, A. F. Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin Virtual Machines. In Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC), Jul. 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Nodes' Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Selfish and Malicious Behavior in Delay Tolerant Networks. In Proceedings of Future Network and Mobile Summit 2013, July 2013 (pdf)

2012

Miguel Correia, Daniel G. Ferro, Flavio Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems, In Proceedings of the Usenix Annual Technical Conference (ATC), 2012 (pdf)

2011

Xavier Vilaça, João Leitão, Miguel Correia, Luís Rodrigues. N-party BAR Transfer. In Proceedings of the 15th International Conference On Principles of Distributed Systems (OPODIS), Dec. 2011 (pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf, software) Best Paper Award

Aldelir Luiz, Lau Cheuk Lung and Miguel Correia. Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA). July 2011 (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In Proceedings of the European Conference on Computer Systems (EuroSys 2011). Saltzburg, Austria, April 2011. (pdf, software)

2010

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf, software)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau, Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach, In Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, April 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

2009

Henrique Moniz, Nuno F. Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC). September 2009. (pdf Best Student Paper Award

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS). September 2009. (pdf, software)

Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), Jul 2009. (pdf)

Paulo Veríssimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. In Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)

2008

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. Finite Memory: a Vulnerability of Intrusion-Tolerant Systems. In Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA). July 2008 (pdf)

Alysson Bessani, Eduardo Alchieri, Miguel Correia and Joni Fraga. DepSpace: A Byzantine Fault-Tolerant Coordination Service. In Proceedings of the European Conference on Computer Systems (EuroSys 2008). April 2008. (pdf, software, software)

2007

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating Byzantine Quorum Systems. In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS), pages 253-264. October 2007. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Decoupled Quorum-based Byzantine-Resilient Coordination in Open Distributed Systems. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 231-238, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia. GridTS: A New Approach for Fault Tolerant Scheduling in Grid Computing. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 187-194, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. In Proceedings of the 10th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC), pages 403-411. May 2007. (pdf)

2006

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf, software)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 568-577, June 2006. (pdf, software)

N. F. Neves and J. Antunes and M. Correia and P. Veríssimo and R. Neves. Using Attack Injection to Discover New Vulnerabilities. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 457-466, June 2006. (pdf, software)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. In Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006. (pdf)

L.C.Lung and F.Favarim and G.T.Santos and M.Correia. An Infrastructure for Adaptive Fault Tolerance on FT-CORBA. In Proceedings of the 9th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC). June 2006. (pdf)

2004

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf)

2002

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel. In Proceedings of the Fourth European Dependable Computing Conference. Toulouse, France, pages 234--252, October 2002. (abstract) (zipped ps) (ps, software)

M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo. Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed Systems. Suita, Japan, pages 2--11, October 2002. (abstract) (zipped ps) (ps)

1998

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. QoS control: an application integrated framework, In Proceedings of the 1st IEEE International Conference on ATM (ICATM´98), Colmar, France, June 1998. (abstract)(ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. An architecture for dynamic multimedia QoS control. In Proceedings of the 7th IFIP/ICCC Conference on Information Networks and Data Applications (INDC´98), Aveiro, Portugal, June 1998. (abstract, ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. Integrated dynamic QoS control for multimedia applications. In Proceedings of the International Symposium SYBEN'98, Broadband Networks and Multimedia Systems, Zurich, Switzerland, May 1998. (abstract, ps.gz)

1995

Miguel Correia, Paulo Pinto. Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract, ps.gz)

4. workshop papers

André Augusto, Rafael Belchior, Imre Kocsis, László Gonczy, André Vasconcelos, Miguel Correia. CBDC bridging between Hyperledger Fabric and permissioned EVM-based blockchains. IEEE ICBC Crosschain Workshop 2023 (pdf)

Félix Monteiro, Miguel Correia. Decentralised Autonomous Organisations for Public Procurement. EASE 2023 4th Blockchain Software Engineering Workshop, Oulu, Finland, June 2023 (pdf)

Filipe Apolinário, João Guiomar, Nelson Escravana, Seven Hrastnik, Éric Hervé, Miguel Correia and Miguel L. Pardal. ComSEC: Secure communications for baggage handling systems. 3rd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection - CSP4CIP (with ESORICS 2022), Sep. 2022.

Rafael Belchior, Benedikt Putz, Guenther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro, SSIBAC: Self-Sovereign Identity Based Access Control. In 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), December 2020 (pdf).

David R. Matos, Miguel L. Pardal, Pedro Adão, Rito Silva and Miguel Correia. Securing Electronic Health Records in the Cloud. 1st Workshop on Privacy by Design in Distributed Systems (with EuroSys 2018), May 2018. (pdf)

Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Miguel Correia. Light-SPD: A Platform to Prototype Secure Mobile Applications. Workshop on Privacy-Aware Mobile Computing (PAMCO), Paderborn, Germany, Jul. 2016. (pdf)

Hylson Vescovi Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. In Proceedings of ACM SIGMETRICS 3rd Workshop on Distributed Cloud Computing (DCC), Jun. 2015. (pdf)

Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo. On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. In First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), Oct. 2012 (pdf)

F. Rocha, M. Correia. Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV, with DSN'11), Hong Kong, June 2011. (pdf)

G. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

A. N. Bessani, P. Sousa, M. Correia. Active Quorum Systems. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), October 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Highly-Resilient Services for Critical Infrastructures. In Proceedings of the Workshop on Embedded Systems and Communications Security (ESCS). September 2009. (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), Jun 2009. (pdf)

F. Favarim and L. C. Lung and J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser Computational Grids based on Tuple Spaces. In International Workshop on Dependability in Service-oriented Grids (WODSOG). October 1st, 2006, Leeds, UK (pdf)

P. Veríssimo, N. F. Neves and M. Correia. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. In CRITIS'06 1st International Workshop on Critical Information Infrastructures Security, pages 1-14, Samos Island, Greece, August 30 - September 2, 2006 (pdf)

Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. In Workshop on Dependable Distributed Data Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004. (pdf)

Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves. The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. In International Workshop on Applied Reliable Group Communication (WARGC'01), in conjunction with ICDCS 2001, Phoenix, USA, pages 17--22, April 2001. (abstract, pdf)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), pages 24--26, Boston, USA, October 2000. (abstract) (pdf)

Pedro Moniz, Miguel Correia, Nuno Mamede. Reasoning about Space in SNePS. SNePS Workshop, Buffalo, NY, USA, 1994. (pdf)

5. national conference/journals papers

Rodrigo Silva, Cláudio Correia, Miguel Correia and Luís Rodrigues. Ataques de Frequência em Deduplicação Cifrada na Nuvem. INForum 2022, Sep. 2022.

Rita Prates, Cláudio Correia, Miguel Correia, Luís Rodrigues. Prova de Resposta Pontual no Acesso ao Armazenamento Contratado na Periferia da Rede. INForum 2021, Sep. 2021.

J. Tribolet, P. Ferreira, M. Correia, C. Ribeiro, P. Adão, N. Escravana. Cibersegurança: o papel da engenharia informática. Ingenium. N.º 159. Maio/Junho 2017.

Hylson Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Replicação de Máquinas de Estado em containers no Kubernetes: uma Proposta de Integração. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.

Paulo R. Pinho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lasaro Jonas Camargos. Replicação de Máquina de Estado Baseada em Prioridade com PRaft. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.

Hylson Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. RafStore: Armazenamento Confiável, Rápido e Geo-Replicado em Provedores de Nuvens. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Tolerância a Faltas Arbitrárias em Processamento Distribuádo de Grafos. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.

P. H. Morais, L. C. Lung, L. O. Rech, F. Dettoni, M. Correia. Replicação de Máquina de Estado Usando Detectores de Intrusão e Virtualização. Anais do IV Simpósio Brasileiro de Engenharia de Sistemas Computacionais, 2014.

Ricardo Carvalho, Miguel Correia. Authentication Security through Diversity and Redundancy for Cloud Computing. Actas do INForum 2014.

A. F. Luiz, L. C. Lung, M. Correia, V. S. Júnior. Validação Atômica Não-Bloqueante com Faltas Bizantinas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2014.

A. F. Luiz, L. C. Lung, M. Correia. Processamento Justo de Transações em Bancos de Dados Tolerantes a Faltas Bizantinas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2013.

F. Dettoni, L. C. Lung, A. F. Luiz, M. Correia. Replicação por Máquina de Estados Tolerante a Faltas Bizantinas usando Máquinas Virtuais Gêmeas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2013.

L. Arantes, J. Lejeune, M. Piffaretti, O. Marin. P. Sens, J. Sopena, A. N. Bessani, V. V. Cogo, M. Correia, P. Costa, M. Pasin, F. Silva. Vers une plate-forme MapReduce tolérant les faulted byzantines. Technique et Science Informatiques, 2012 (to appear)

J. Félix, A. Bessani, M. Correia. Gestão de Estado Eficiente no Serviço de Coordenação DDS.  Actas do INFORUM 2012, Setembro 2012. (pdf)

A. F. Luiz, L. C. Lung, M. Correia. RIST: Um Middleware para Replicação e Interoperabilidade de Sistemas Transacionais. Anais do XXXVIII Seminário Integrado de Software e Hardware (SEMISH), Julho 2011.

A. F. Luiz, L. C. Lung, M. Correia. Protocolo Tolerante a Faltas Bizantinas para Bases de Dados Transacionais. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), Junho 2011. (pdf)

Luciana Arantes, Jonathan Lejeune, Madeleine Piffaretti, Olivier Marin, Pierre Sens et Julien Sopena, Alysson Bessani, Vinicius Cogo, Miguel Correia, Pedro Costa, Marcelo Pasin, Fabricio Silva. Étude d'une architecture MapReduce tolérant les fautes byzantines. RenPar'20, Maio 2011.

Sérgio Nunes, Miguel Correia. From Risk Awareness to Security Controls: Benefits of Honeypots to Companies. In Proceedings of the 2nd Ibero-American Web Applications Security Conference 2010 - IBWAS'10, Dezembro 2010. (pdf)

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau. SMIT: Uma Arquitetura Tolerante a Intrusões Baseada em Virtualização. In Simpósio Brasileiro de Segurança (SBSeg), Outubro 2010. (pdf)

S. Nunes, M. Correia. Web Application Risk Awareness with High Interaction Honeypots. In Actas do INForum - Simpósio de Informática 2010. Braga, Setembro de 2010. (pdf)

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau. Desenvolvimento de Serviços Tolerantes a Intrusões Usando Máquinas Virtuais. XXXVI Seminário Integrado de Software e Hardware (CSBC 2009 - SEMISH). Bento Gonçaves RS, Brasil, Julho de 2009. (pdf)

Ibéria Medeiros, Miguel Correia. Detecção de Vulnerabilidades de Inteiros na Adaptação de Software de 32 para 64 bits. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf, software)

Carlos Lourenço, Miguel Correia. Segurança por Omissão de Sistemas de Gestão de Bases de Dados. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf)

Pan Jieke, João Redol, Miguel Correia. Detecção Cooperativa de Intrusões em Redes Carrier Ethernet. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Explorando a Abstração Espaço de Tuplas no Escalonamento em Grades Computacionais. In 26º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém, Brazil, Mai./Jun. 2007. (pdf)

Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung. DepSpace: Um Middleware para Coordenacão em Ambientes Dinâmicos e Não Confiáveis.  In Salão de Ferramentas do 25º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém, Brazil, Mai./Jun. 2007. (pdf)

Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung. Provendo Confidencialidade em Espaços de Tuplas Tolerantes a Intrusões.  In  VI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg 2006), Santos, Brazil, Aug./Sep. 2006. (pdf)

João Antunes, Nuno F. Neves, Miguel Correia, Paulo Veríssimo, Rui Neves. Diagnóstico de Vulnerabilidades através de Injecção de Ataques. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 61-76, November 2005.

Pan Jieke, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Um Núcleo de Segurança Distribuído para Suporte a Protocolos Tolerantes a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 13-32, November 2005. (pdf)

José Pascoal, Tiago Jorge, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. FTP Tolerante a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 33-52, November 2005. (pdf)

Tiago Jorge, José Pascoal, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Concretização de um Sistema de Comunicação em Grupo Tolerante a Intrusões. In 7ª Conferência sobre Redes de Computadores. Leiria, Portugal, pages 111-122, October 2004. (pdf)

Lau Cheuk Lung , Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo. A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB. In 21º Simpósio Brasileiro de Redes de Computadores. Natal, Brasil, pages 649--663, May 2003. (pdf)

6. technical reports

Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia. Learning to generate Reliable Broadcast Algorithms, arXiv, 2022 (doc)

Rafael Belchior, Limaris Torres, Jonas Pfannschmid, André Vasconcelos, Miguel Correia. Is My Perspective Better Than Yours? Blockchain Interoperability with Views, TechRxiv, v2, 07.07.2022 (doc)

Rafael Belchior, Miguel Correia, Thomas Hardjono. DLT Gateway Crash Recovery Mechanism, IETF Internet-Draft draft-belchior-gateway-recovery v4, May 2022 (doc)

SPARTA deliverable D4.4 Cybersecurity threat prediction framework, Mar. 2022

SPARTA deliverable D4.6 Visual Analytics System for Cybersecurity threat analysis, Dec. 2021

Rafael Belchior, Miguel Correia, Thomas Hardjono. DLT Gateway Crash Recovery Mechanism, IETF Internet-Draft draft-belchior-gateway-recovery v1, March 2021 (doc)

SPARTA deliverable D4.2 Cybersecurity threat analysis model, January 2021

QualiChain project deliverable D5.3 QualiChain Components Design and Development, Release II, September 2020

Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. A Survey on Blockchain Interoperability: Past, Present, and Future Trends, arXiv:2005.14282. August 2020

QualiChain project deliverable D6.1 QualiChain Testing Plan, January 2020

QualiChain project deliverable D5.2 QualiChain Components Design and Development, Release I, December 2019

Ibéria Medeiros, Nuno Neves, Miguel Correia. Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages, arXiv:1910.06826. October 2019

QualiChain project deliverable D5.1 QualiChain Integrated Architecture, October 2019

QualiChain project deliverable D4.1 QualiChain Value Adding Services Foundations, August 2019

QualiChain project deliverable D7.1 Pilots Preparation Handbook, July 2019

QualiChain project deliverable D2.3 QualiChain Implications' Assessment Framework, June 2019

QualiChain project deliverable D2.1 Landscape Analysis, QualiChain Concept and Potential Investigation Report, June 2019

Erick Lavoie, Laurie Hendren, Fréderic Desprez, Miguel Correia. Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC, arXiv:1904.11402. April 2019

QualiChain project deliverable D9.1 Project Management Handbook, January 2019

Erick Lavoie, Laurie Hendren, Fréderic Desprez, Miguel Correia. Pando: Personal Volunteer Computing in Browsers, arXiv:1803.08426. March 2018

SafeCloud project deliverable D2.8, Final Secure File System, February 2018

SafeCloud project deliverable D1.3, Final version of the private communication middleware, February 2018

SafeCloud project deliverable D2.4, Initial Secure File System, February 2017

SafeCloud project deliverable D1.2, First version of the private communication middleware components, February 2017

SafeCloud project deliverable D4.1, SafeCloud Architecture, August 2016

SafeCloud project deliverable D1.1, Private communication middleware architecture, February 2016

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia Medusa: An Efficient Cloud Fault-Tolerant MapReduce, arXiv:1511.07185. November 2015

Alysson Bessani, Miguel Correia. Consistency Anchor Formalization and Correctness Proofs. DI-FCUL TR-2014-2, May 2014 (pdf)

Giuliana Veronese, Miguel Correia, Alysson Bessani. Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. DI-FCUL TR-2009-14, June 2009 (pdf)

G. Veronese, M. Correia, A. Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance: Algorithm and Evaluation. DI-FCUL TR-2009-15, June 2009. (pdf)

Nuno Ferreira Neves, Paulo Veríssimo (Editors), Architecture, Services and Protocols for CRUTIAL, Project CRUTIAL, Deliverable D18, March 2009. (also Technical Report DI/FCUL TR-09-5, Department of Computer Science, University of Lisbon, March 2009) (pdf)

Giuliana Franceschinis (Editor), Experimental Validation of Architectural Solutions, Project CRUTIAL, Deliverable D20,  March 2009. (also Technical Report DI/FCUL TR-09-8, Department of Computer Science, University of Lisbon, March 2009) (pdf)

R. Baldoni et al. Resilient Computing Courseware. Resist NoE Deliverable D38. Technical Report DI/FCUL TR-09-10. May 2009 (abstract/pdf)

R. Baldoni et al. Resilient Computing Curriculum. Resist NoE Deliverable D37. Technical Report DI/FCUL TR-09-9. May 2009 (abstract/pdf)

G. Veronese, M. Correia, A. Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance. DI-FCUL TR-2009-15, Dec. 2008. (pdf)

N. F. Neves and P. Veríssimo, Editors. CRUTIAL Deliverable D10 - Preliminary specification of services and protocols. January 2008 (abstract/pdf)

Paulo Sousa and Alysson Neves Bessani and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. Technical Report DI/FCUL TR-07-17. October 2007 (abstract/pdf)

RESIST Network of Excellence Deliverable D13, From Resilience-Building to Resilience-Scaling Technologies: Directions (abstract/pdf)

N. F. Neves and P. Veríssimo, Editors. CRUTIAL Deliverable D4 - Preliminary architecture specification, January 2007 (pdf)

W. Ahrendt, J. Karlsson, R. Jimenez-Peris, U. Voges, H. Pfeifer, G. Lami, F. Giandomenico, Andrea Bondavalli, Paulo Veríssimo, Miguel Correia, P. Palanque, Michel Raynal, C. Cachin, G. Urvoy-Keller, N. Suri, L. Strigini, R. Bloomfield, A. Pataricza, I. Majzik, H. Waeselynck, J. C. Fabre, K. Kanoun, J.-C. Laprie, L. Simoncini, Resilient Computing Curriculum Draft -- ReSIST NoE Deliverable D16. June 2007 (abstract/pdf)

Alysson Neves Bessani and Paulo Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8. April 2007 (abstract/pdf)

Miguel Correia and Nuno F. Neves (editors). Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems. Technical Report DI/FCUL TR-07-5. March 2007 (abstract/pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey. In Resilience-building Technologies: State of Knowledge, RESIST Network of Excellence Deliverable D12, Part Algo, Chapter 1, September 2006. (chapter's pdf, report abstract/pdf)

Rafael R. Obelheiro, Alysson Neves Bessani, Lau Cheuk Lung, Miguel Correia. How Practical Are Intrusion-Tolerant Systems? Technical Report DI/FCUL TR-06-15. September 2006. (abstract/pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Towards a Dependable Tuple Space. Technical Report DI/FCUL TR-06-4. April 2006. (abstract/pdf)

Gunjan Khanna, Mike Yu Cheng, Jagadeesh Dyaberi, Saurabh Bagchi, Miguel P. Correia, Paulo Verissimo, Probabilistic Diagnosis Through Non-Intrusive Monitoring In Distributed Applications. Technical Report Purdue Univ. TR-ECE-05-19, December 2005. (pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Miguel P. Correia, Paulo J. Verissimo, Saurabh Bagchi. Automated Monitor Based Diagnosis In Distributed System. Technical Report Purdue Univ. TR-ECE-05-13, November 2005. (pdf)

Miguel Correia, Alysson N. Bessani, Nuno F. Neves, Lau C. Lung, Paulo Veríssimo. Improving Byzantine Protocols with Secure Computational Components. Technical Report DI/FCUL TR-05-20. December 2005. (abstract/pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. Technical Report DI/FCUL TR-04-6. Department of Computer Science, University of Lisbon. July 2004. (abstract/pdf) (extended version of the SRDS'04 paper; includes proofs)

M. Correia and N. F. Neves and P. Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Technical Report DI/FCUL TR-04-5. Department of Computer Science, University of Lisbon. June 2004. (abstract/pdf, software). Revised version as Technical Report DI/FCUL TR-05-14 (asbtract/pdf)

M. Correia and N. F. Neves and L. C. Lung and P. Veríssimo.  Low Complexity Byzantine-Resilient Consensus. Technical Report DI/FCUL TR-03-25. Department of Computer Science, University of Lisbon. August 2003. (abstract/pdf) (older version of the Distributed Computing 2004 consensus paper)

Nuno F. Neves, Paulo Veríssimo, Editors. Complete Specification of APIs and Protocols for the MAFTIA Middleware. Project MAFTIA deliverable D9, July 2002. (abstract/pdf)

Nuno F. Neves, Paulo Veríssimo, Editors. Running Lab Prototype of MAFTIA Middleware. Project MAFTIA deliverable D25, March 2002. (pdf)

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel (Extended Version). DI/FCUL TR 01-12, Department of Computer Science, University of Lisbon, University of Lisbon, December 2001. (abstract/pdf) (extended version of an older version of the EDCC paper)

N. F. Neves and P. Veríssimo, Editors. First Specification of APIs and Protocols for MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D24, August 2001. (abstract/pdf)

P. Veríssimo and N. F. Neves, Editors. Service and Protocol Architecture for the MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D23, January 2001. (abstract/pdf)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. Technical Report DI/FCUL TR-00-6. Department of Computer Science, University of Lisbon. September 2000. (abstract/pdf) (extended version of the ISW-2000 paper)

7. short papers

Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia. FingerCI: Generating Specifications for Critical Infrastructures. 37th Annual ACM Symposium on Applied Computing, April 2022.(pdf).

Pedro Marques, Luis Filipe Dias and Miguel Correia. CiberVIZ - Ferramenta de Visualização e Deteção de Intrusões no Ciberespaço. 3º Encontro de Investigação e Desenvolvimento em Ciências Militares. Nov. 2021

Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Fluxos de Rede e Indicadores de Desempenho contra o Cryptojacking. Jornadas das Engenharias da Academia Militar (JEAM-V), 2021.

JR Amado, S Signorello, M Correia, F Ramos. Poster: Speeding Up Network Intrusion Detection. 2020 IEEE 28th International Conference on Network Protocols (ICNP), 2020.

Marcelo Silva, Miguel Correia and Miguel Matos. P2P and Cloud File Storage for Blockchain Applications (short paper). In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Tiago Fernandes, Luís Dias and Miguel Correia. Detecção de Intrusões por Monitorização do Comportamento através de Mudanças de Clusters. Jornadas das Engenharias da Academia Militar, 2020.

Alexandra Figueiredo, Tatjana Lide and Miguel Correia. Multi-Language Web Vulnerability Detection (fast abstract). In Proceedings of ISSRE 2020, October 2020 (pdf).

Simão Valente, Luís Dias and Miguel Correia. Detecção de Intrusões com Diversas Fontes de Dados e Aprendizagem Não Supervisionada. Jornadas das Engenharias da Academia Militar, 2019.

Hélder Figueiredo Reia, Rui Neves, Miguel Correia, Luís Dias. Análise de dados de segurança informática em tempo real Jornadas das Engenharias da Academia Militar, 2018.

Roberto Ponte, Ibéria Medeiros, and Miguel Correia. Fuzzing Ethereum Smart Contracts (research statement). DSN Workshop on Byzantine Consensus and Resilient Blockchains (BCRB '18), June 2018.

Miguel Guerra, Miguel Correia, Benjamin Tabmann, Hans P. Reiser. ITZ: An Introspection Library for ARM TrustZone. In INForum 2017, Out. 2017.

André Joaquim, Miguel Pardal, Miguel Correia. vtTLS: A Vulnerability-Tolerant Communication Protocol. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf, software)

Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Eugénio Silva, Miguel Correia. Implementação de um Sistema de Ficheiros em Nuvem utilizando Criptografia Homomórfica. In INForum 2016, Sep. 2016.

M. Correia. Critical Information Infrastructure Protection: Urgent vs. Important. 2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, Barcelona, Jun. 2012 (pdf)

M. Correia. Software Execution Protection in the Cloud, Keynote at 1st European Workshop on Dependable Cloud Computing (EWDCC 2012), Sibiu, Romania, May 8th 2012 (pdf)

M. Correia, D. G. Ferro, F. Junqueira, M. Serafini. Practical Hardening of Crash-Tolerant Systems. Poster at the 23rd ACM Symposium on Operating Systems Principles (SOSP), October 2011.

A. N. Bessani, V. V. Cogo, M. Correia, P. Costa, M. Pasin, F. Silva, L. Arantes, O. Marin, P. Sens, J. Sopena. Making Hadoop MapReduce Byzantine Fault-Tolerant. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) July 2010. (pdf)

A. Bessani, M. Correia, P. Verissimo. Intrusion Tolerance: The killer application for BFT Protocols (?). BFTW3: Why? When? Where? Workshop on Theory and Practice of Byzantine Fault Tolerance. Elche, Spain, September 22, 2009 (pdf)

Ibéria Medeiros, Miguel Correia. Finding Vulnerabilities in Software Ported from 32 to 64-bit CPUs. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung. From Crash to Byzantine Consensus with 2f + 1 Processes. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Alysson N. Bessani. Byzantine Fault Tolerance with a Spinning Primary. Poster at European Conference on Computer Systems (EuroSys 2009). April 2009.

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung. Byzantine 2f+1 State Machine Replication with COTS Components. Poster at European Conference on Computer Systems (EuroSys 2008). April 2008.

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. On the Effects of Finite Memory on Intrusion-Tolerant Systems. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 401--404. December 2007 (pdf)

Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno F. Neves, Paulo Verissimo. When 3 f +1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. 21st International Symposium on Distributed Computing (DISC 2007). September 2007. (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Protecting CRUTIAL Things. Fast Abstract at the International Conference on Dependable Systems and Networks, June 2007.

Pan Jieke, João Redol, Miguel Correia. Specification-Based Intrusion Detection System for Carrier Ethernet. In International Conference on Web Information Systems and Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. A System for Protecting CRUTIAL Things. EuroSys 2007 posters (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Brief Announcement: Decoupled Quorum-based Byzantine-resilient Coordination in Open Distributed Systems. 20th International Symposium on Distributed Computing (DISC 2006). September 2006. (pdf)

Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo, Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Lung, Paulo Veríssimo, Byzantine-Resistant Consensus based on a Novel Approach to Intrusion Tolerance, Fast abstract in Supplement of the 10th Pacific Rim International Symposium on Dependable Computing, March 2004. (pdf)

M. Correia, N. F. Neves, L. C. Lung, P. Veríssimo. A Wormhole-based Intrusion-Tolerant Group Communication System - WIT-GCS. The 5th Cabernet Plenary Workshop, November 2003. (pdf) (the system was later renamed to Worm-IT -- see journal papers above)

M. Correia, L. C. Lung, N. F. Neves, P. Veríssimo. A Byzantine-Resilient Protocol using the TTCB. Fast abstract. Supplement of the Fourth European Dependable Computing Conference. Toulouse, France, October 2002. (zipped ps) (ps)

A. Casimiro and M. Correia. Recent Advances on the Timely Computing Base Model. Fast Abstract at the International Conference on Dependable Systems and Networks, Göteborg, Sweden, June 2001. (pdf)

Miguel Correia. Including Confidentiality in a Multimedia QoS Adaptation Architecture (extended abstract). 5th CaberNet Radicals Workshop, Valadares, Porto, Portugal, 5-8 July 1998. (html)

8. thesis

Miguel Correia. Intrusion Tolerance based on Architectural Hybridization. PhD Thesis. Faculdade de Ciências da Universidade de Lisboa, Lisboa, Dezembro de 2003

Miguel Correia. Sincronização Multimédia Intrínseca em Sistemas Distribuídos. Tese de Mestrado. Instituto Superior Técnico, Lisboa, November 1995 (Intrinsic Multimedia Synchronization in Distributed Systems, MsC Thesis, in portuguese)

home