miguel pupo correia           
 

publications

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

1. journal papers:

Pedro Costa, Fernando Ramos, and Miguel Correia. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, Special Issue on Middleware for Multicloud, Accepted for publication, 2017.

Hylson V. Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza. State machine replication in containers managed by Kubernetes. Journal of Systems Architecture, Volume 73, Pages 1-60, Feb. 2017. (online)

Alysson Bessani, Nuno F. Neves, Paulo Veríssimo, Wagner Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia. JITeR: Just-in-time application-layer routing. Computer Networks, Volume 104, Pages 122–136, 20 July 2016. (download, preprint pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54–69, March 2016. (pdf)

Hylson Vescovi Netto, Lau Cheuk Lung, Tulio Alberton Ribeiro, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. ACM Performance Evaluation Review, Volume 43, Issue 3, Pages 21-24, Dec. 2015.

Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia, Betweenness centrality in delay tolerant networks: A survey. Ad Hoc Networks, 33, pp. 284-305, 2015.

Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia, A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks. Applied Soft Computing, 30, pp. 104-112, 2015. (online).

A. F. Luiz, L. C. Lung, M. Correia, MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Transactions on Storage, vol. 9, n. 4, Nov. 2013. (pdf)

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud, IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011. (abstract/pdf)

Henrique Moniz, Nuno Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures, Distributed Computing, 24(3-4), pp. 165-175, 2011.

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452–465, April 2010. (pdf)

J. Antunes and N. F. Neves and M. Correia and P. Veríssimo and R. Neves. Vulnerability Detection with Attack Injection. IEEE Transactions on Software Engineering, vol. 36, n. 3, pp. 357–370, March 2010. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space. IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug. 2009. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract) (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. The CRUTIAL Way of Critical Infrastructure Protection. IEEE Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract) (pdf)

Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL reference critical information infrastructure architecture: a blueprint. International Journal of System of Systems Engineering, vol. 1, n. 1/2, pp 78-95, 2008. (selected as one of the best papers from the 2006 First International Workshop on Critical Information Infrastructures Security) (abstract) (pdf)

Alysson Neves Bessani, Eduardo Pelison Alchieri, Miguel Correia, Joni Silva Fraga. DepSpace: a Byzantine fault-tolerant coordination service. ACM SIGOPS Operating Systems Review, vol. 42 , issue 4, pages 163-176, May 2008 (abstract) (pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007 (abstract) (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007 (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract) (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 Page(s):1120 - 1131 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237--249, March 2005. (abstract) (pdf)

    edited

Operating Systems Review, vol. 48, n. 2, 2014, Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing (with Neeraj Mittal) (online)

Operating Systems Review, July 2013, Column: Selected extended papers from DISCCO 2012 first international workshop on dependability issues in cloud computing (with Neeraj Mittal) (online)

2. books

Francisco Rocha, Salvador Abreu, Miguel Correia. The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud, IEEE Computer Society Press, March 2013.

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software, FCA editores. September 2010.

    edited

Miguel Correia and Neeraj Mittal (Eds.). 2013. Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing. ACM, New York, NY, USA. ISBN 978-1-4503-2248-5 (online)

Proceedings Ninth European Dependable Computing Conference - EDCC 2012. ISBN 978-0-7695-4671-1 (online)

Luís Soares Barbosa e Miguel Correia, editores. Actas do INForum – Simpósio de Informática 2010. Braga, Setembro de 2010.

Miguel Correia and Jean-Phillipe Martin (eds.). Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems. ACM International Conference Proceedings Series. ISBN 978-1-59593-986-9 (online)

Miguel Correia and Nuno F. Neves (eds.). Proceedings of the Workshop on Recent Advances on Intrusion-Tolerant Systems. (online)

    book chapters

Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)

Miguel Correia. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud (invited chapter). In Euro-Par 2013: Parallel Processing Workshops, Lecture Notes in Computer Science Volume 8374, pp 95-104, 2014 (pdf)

Henrique Moniz, Alessandra Tedeschi, Nuno Ferreira Neves, Miguel Correia. A Distributed Systems Approach to Airborne Self-Separation. In Computational Models, Software Engineering and Advanced Technologies in Air Transportation: Next Generation Applications, edited by Li Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI Global, October 2009. (pdf)

Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa. Intrusion-Resilient Middleware Design and Validation. In Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), pages 615-678, Emerald, 2009. (pdf)

P. Verissimo, N. F. Neves, M. Correia, Y. Deswarte, A. Abou El Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for Critical Information Infrastructures. In Architecting Dependable Systems V, R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS 5135, pp 1-27. Springer Verlag, 2008. (pdf)

Miguel P. Correia. Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos. V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade Brasileira de Computação, Setembro de 2005 (pdf) (slides) (versão extendida, also as DI-FCUL tech report)

Paulo Veríssimo and Nuno Ferreira Neves and Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer Verlag, 2003. An extended version is available as DI/FCUL TR03-05 (abstract) (pdf)

3. conference/workshop papers

2017

Naércio Magaia, Paulo Pereira, Miguel Correia. REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks. In Proceedings of the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2017), Nov. 2017.

Erick Lavoie, Laurie Hendren, and Miguel Correia. Xor-Based Topology Management Beyond Kademlia. In Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), Sep. 2017. (pdf)

Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia and Marco Vieira. On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. In Proceedings of the 13th European Dependable Computing Conference (EDCC 2017), Sep. 2017.

Sileshi D. Yalew, Gerald McGuire, Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Demonstrating a Tool for Injection Attack Prevention in MySQL. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2017. (pdf)

Diogo Frazão, João Redol, and Miguel Correia. PARADISE: Modular Click Fraud Detection. In 2017 European Security Conference: Cybersecurity Analytics, Jun. 2017.

Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. In Proceedings of the IFIP Networking Conference, Jun. 2017. (pdf)

Arnaldo Gouveia, Miguel Correia. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. In Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), Jun. 2017. (pdf)

Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf) Best Student Paper Award

2016

David Matos, Miguel Correia. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Diogo Raposo, Miguel Pardal, Luís Rodrigues, Miguel Correia. MACHETE: Multi-path Communication for Security. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Karan Balu, Miguel Pardal, Miguel Correia. DARSHANA: Detecting Route Hijacking For Communication Confidentiality. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Christine Blakemore, João Redol, Miguel Correia. Fingerprinting for Web Applications: from Devices to Related Groups. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities. In Proceedings of the IEEE International Symposium on Software Testing and Analysis (ISSTA), Jul. 2016. (pdf)

Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Miguel Correia. Light-SPD: A Platform to Prototype Secure Mobile Applications. Workshop on Privacy-Aware Mobile Computing (PAMCO), Paderborn, Germany, Jul. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Equipping WAP with WEAPONS to Detect Vulnerabilities. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2016. (pdf)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf)

Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. Hacking the DBMS to Prevent Injection Attacks. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CoDASPy), March 2016. (pdf)

Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos. In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)

2015

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015. (pdf)

Dário Nascimento, Miguel Correia. Shuttle: Intrusion Recovery for PaaS. In Proceedings of the 35th International Conference on Distributed Computing Systems (ICDCS), Jun.-Jul. 2015. (pdf, slides, video)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

Hylson Vescovi Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. In Proceedings of ACM SIGMETRICS 3rd Workshop on Distributed Cloud Computing (DCC), Jun. 2015. (pdf)

2014

A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia, N. Pasin, P. Verissimo. SCFS: a Shared Cloud-backed File System. In Proceedings of Usenix Annual Technical Conference (ATC), 2014. (pdf)

I. Medeiros, N. F. Neves, M. Correia. Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives. In Proceedings of 23rd International World Wide Web Conference, 2014. (pdf)

2013

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

F. Dettoni, L. C. Lung, M. Correia, A. F. Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin Virtual Machines. In Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC), Jul. 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Nodes' Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Selfish and Malicious Behavior in Delay Tolerant Networks. In Proceedings of Future Network and Mobile Summit 2013, July 2013 (pdf)

2012

Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo. On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. In First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), Oct. 2012 (pdf)

Miguel Correia, Daniel G. Ferro, Flavio Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems, In Proceedings of the Usenix Annual Technical Conference (ATC), 2012 (pdf)

2011

Xavier Vilaça, João Leitão, Miguel Correia, Luís Rodrigues. N-party BAR Transfer. In Proceedings of the 15th International Conference On Principles of Distributed Systems (OPODIS), Dec. 2011 (pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf) Best Paper Award

Aldelir Luiz, Lau Cheuk Lung and Miguel Correia. Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA). July 2011 (pdf)

F. Rocha, M. Correia. Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV, with DSN'11), Hong Kong, June 2011. (pdf)

G. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In Proceedings of the European Conference on Computer Systems (EuroSys 2011). Saltzburg, Austria, April 2011. (pdf)

2010

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

A. N. Bessani, P. Sousa, M. Correia. Active Quorum Systems. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), October 2010. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau, Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach, In Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, April 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

2009

Henrique Moniz, Nuno F. Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC). September 2009. (pdf Best Student Paper Award

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One’s Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS). September 2009. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Highly-Resilient Services for Critical Infrastructures. In Proceedings of the Workshop on Embedded Systems and Communications Security (ESCS). September 2009. (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), Jun 2009. (pdf)

Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), Jul 2009. (pdf)

Paulo Veríssimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. In Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)

2008

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. Finite Memory: a Vulnerability of Intrusion-Tolerant Systems. In Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA). July 2008 (pdf)

Alysson Bessani, Eduardo Alchieri, Miguel Correia and Joni Fraga. DepSpace: A Byzantine Fault-Tolerant Coordination Service. In Proceedings of the European Conference on Computer Systems (EuroSys 2008). April 2008. (pdf) (software)

2007

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating Byzantine Quorum Systems. In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS), pages 253-264. October 2007. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Decoupled Quorum-based Byzantine-Resilient Coordination in Open Distributed Systems. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 231-238, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia. GridTS: A New Approach for Fault Tolerant Scheduling in Grid Computing. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 187-194, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. In Proceedings of the 10th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC), pages 403-411. May 2007. (pdf)

2006

F. Favarim and L. C. Lung and J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser Computational Grids based on Tuple Spaces. In International Workshop on Dependability in Service-oriented Grids (WODSOG). October 1st, 2006, Leeds, UK (pdf)

P. Veríssimo, N. F. Neves and M. Correia. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. In CRITIS'06 1st International Workshop on Critical Information Infrastructures Security, pages 1-14, Samos Island, Greece, August 30 - September 2, 2006 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 568-577, June 2006. (pdf)

N. F. Neves and J. Antunes and M. Correia and P. Veríssimo and R. Neves. Using Attack Injection to Discover New Vulnerabilities. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 457-466, June 2006. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. In Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006. (pdf)

L.C.Lung and F.Favarim and G.T.Santos and M.Correia. An Infrastructure for Adaptive Fault Tolerance on FT-CORBA. In Proceedings of the 9th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC). June 2006. (pdf)

2004

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf)

Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. In Workshop on Dependable Distributed Data Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004. (pdf)

2002

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel. In Proceedings of the Fourth European Dependable Computing Conference. Toulouse, France, pages 234--252, October 2002. (abstract) (zipped ps) (ps) (software)

M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo. Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed Systems. Suita, Japan, pages 2--11, October 2002. (abstract) (zipped ps) (ps)

2001

Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves. The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. In International Workshop on Applied Reliable Group Communication (WARGC'01), in conjunction with ICDCS 2001, Phoenix, USA, pages 17--22, April 2001. (abstract) (pdf)

2000

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), pages 24--26, Boston, USA, October 2000. (abstract) (pdf)

1998

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. QoS control: an application integrated framework, In Proceedings of the 1st IEEE International Conference on ATM (ICATM´98), Colmar, France, June 1998. (abstract)(ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. An architecture for dynamic multimedia QoS control. In Proceedings of the 7th IFIP/ICCC Conference on Information Networks and Data Applications (INDC´98), Aveiro, Portugal, June 1998. (abstract) (ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. Integrated dynamic QoS control for multimedia applications. In Proceedings of the International Symposium SYBEN'98, Broadband Networks and Multimedia Systems, Zurich, Switzerland, May 1998. (abstract) (ps.gz)

1995

Miguel Correia, Paulo Pinto. Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract) (ps.gz)

1994

Pedro Moniz, Miguel Correia, Nuno Mamede. Reasoning about Space in SNePS. SNePS Workshop, Buffalo, NY, USA, 1994. (pdf)

4. national conference/journals papers

Hylson Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Replicação de Máquinas de Estado em containers no Kubernetes: uma Proposta de Integração. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.

Paulo R. Pinho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lasaro Jonas Camargos. Replicação de Máquina de Estado Baseada em Prioridade com PRaft. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2016.

Hylson Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. RafStore: Armazenamento Confiável, Rápido e Geo-Replicado em Provedores de Nuvens. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Tolerância a Faltas Arbitrárias em Processamento Distribuádo de Grafos. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2015.

P. H. Morais, L. C. Lung, L. O. Rech, F. Dettoni, M. Correia. Replicação de Máquina de Estado Usando Detectores de Intrusão e Virtualização. Anais do IV Simpósio Brasileiro de Engenharia de Sistemas Computacionais, 2014.

Ricardo Carvalho, Miguel Correia. Authentication Security through Diversity and Redundancy for Cloud Computing. Actas do INForum 2014.

A. F. Luiz, L. C. Lung, M. Correia, V. S. Júnior. Validação Atômica Não-Bloqueante com Faltas Bizantinas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2014.

A. F. Luiz, L. C. Lung, M. Correia. Processamento Justo de Transações em Bancos de Dados Tolerantes a Faltas Bizantinas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2013.

F. Dettoni, L. C. Lung, A. F. Luiz, M. Correia. Replicação por Máquina de Estados Tolerante a Faltas Bizantinas usando Máquinas Virtuais Gêmeas. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), 2013.

L. Arantes, J. Lejeune, M. Piffaretti, O. Marin. P. Sens, J. Sopena, A. N. Bessani, V. V. Cogo, M. Correia, P. Costa, M. Pasin, F. Silva. Vers une plate-forme MapReduce tolérant les faulted byzantines. Technique et Science Informatiques, 2012 (to appear)

J. Félix, A. Bessani, M. Correia. Gestão de Estado Eficiente no Serviço de Coordenação DDS.  Actas do INFORUM 2012, Setembro 2012. (pdf)

A. F. Luiz, L. C. Lung, M. Correia. RIST: Um Middleware para Replicação e Interoperabilidade de Sistemas Transacionais. Anais do XXXVIII Seminário Integrado de Software e Hardware (SEMISH), Julho 2011.

A. F. Luiz, L. C. Lung, M. Correia. Protocolo Tolerante a Faltas Bizantinas para Bases de Dados Transacionais. Anais do Simpósio Brasileiro de Redes de Computadores (SBRC), Junho 2011. (pdf)

Luciana Arantes, Jonathan Lejeune, Madeleine Piffaretti, Olivier Marin, Pierre Sens et Julien Sopena, Alysson Bessani, Vinicius Cogo, Miguel Correia, Pedro Costa, Marcelo Pasin, Fabricio Silva. Étude d'une architecture MapReduce tolérant les fautes byzantines. RenPar'20, Maio 2011.

Sérgio Nunes, Miguel Correia. From Risk Awareness to Security Controls: Benefits of Honeypots to Companies. In Proceedings of the 2nd Ibero-American Web Applications Security Conference 2010 - IBWAS'10, Dezembro 2010.

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau. SMIT: Uma Arquitetura Tolerante a Intrusões Baseada em Virtualização. In Simpósio Brasileiro de Segurança (SBSeg), Outubro 2010. (pdf)

S. Nunes, M. Correia. Web Application Risk Awareness with High Interaction Honeypots. In Actas do INForum – Simpósio de Informática 2010. Braga, Setembro de 2010. (pdf)

Valdir Stumm Júnior, Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau. Desenvolvimento de Serviços Tolerantes a Intrusões Usando Máquinas Virtuais. XXXVI Seminário Integrado de Software e Hardware (CSBC 2009 - SEMISH). Bento Gonçaves RS, Brasil, Julho de 2009. (pdf)

Ibéria Medeiros, Miguel Correia. Detecção de Vulnerabilidades de Inteiros na Adaptação de Software de 32 para 64 bits. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf) (software)

Carlos Lourenço, Miguel Correia. Segurança por Omissão de Sistemas de Gestão de Bases de Dados. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf)

Pan Jieke, João Redol, Miguel Correia. Detecção Cooperativa de Intrusões em Redes Carrier Ethernet. Actas da 3ª Conferência Nacional sobre Segurança nas Organizações (SINO'07). Lisboa, Novembro de 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Explorando a Abstração Espaço de Tuplas no Escalonamento em Grades Computacionais. In 26º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém, Brazil, Mai./Jun. 2007. (pdf)

Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung. DEPSPACE: Um Middleware para Coordenacão em Ambientes Dinâmicos e Não Confiáveis.  In Salão de Ferramentas do 25º Simpósio Brasileiro de Redes de Computadores (SBRC), Belém, Brazil, Mai./Jun. 2007. (pdf)

Alysson Neves Bessani, Eduardo Adílio Pelison Alchieri, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung. Provendo Confidencialidade em Espaços de Tuplas Tolerantes a Intrusões.  In  VI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg 2006), Santos, Brazil, Aug./Sep. 2006. (pdf)

João Antunes, Nuno F. Neves, Miguel Correia, Paulo Veríssimo, Rui Neves. Diagnóstico de Vulnerabilidades através de Injecção de Ataques. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 61-76, November 2005.

Pan Jieke, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Um Núcleo de Segurança Distribuído para Suporte a Protocolos Tolerantes a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 13-32, November 2005. (pdf)

José Pascoal, Tiago Jorge, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. FTP Tolerante a Intrusões. In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, pages 33-52, November 2005. (pdf)

Tiago Jorge, José Pascoal, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Concretização de um Sistema de Comunicação em Grupo Tolerante a Intrusões. In 7ª Conferência sobre Redes de Computadores. Leiria, Portugal, pages 111-122, October 2004. (pdf)

Lau Cheuk Lung , Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo. A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB. In 21º Simpósio Brasileiro de Redes de Computadores. Natal, Brasil, pages 649--663, May 2003. (pdf)

5. technical reports

SafeCloud project deliverable D4.1, SafeCloud Architecture, August 2016

SafeCloud project deliverable D1.1, Private communication middleware architecture, February 2016

Alysson Bessani, Miguel Correia. Consistency Anchor Formalization and Correctness Proofs. DI–FCUL TR–2014–2, May 2014 (pdf)

Giuliana Veronese, Miguel Correia, Alysson Bessani. Spin One’s Wheels? Byzantine Fault Tolerance with a Spinning Primary. DI–FCUL TR–2009–14, June 2009 (pdf)

G. Veronese, M. Correia, A. Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance: Algorithm and Evaluation. DI-FCUL TR-2009-15, June 2009. (pdf)

Nuno Ferreira Neves, Paulo Veríssimo (Editors), Architecture, Services and Protocols for CRUTIAL, Project CRUTIAL, Deliverable D18, March 2009. (also Technical Report DI/FCUL TR-09-5, Department of Computer Science, University of Lisbon, March 2009) (pdf)

Giuliana Franceschinis (Editor), Experimental Validation of Architectural Solutions, Project CRUTIAL, Deliverable D20,  March 2009. (also Technical Report DI/FCUL TR-09-8, Department of Computer Science, University of Lisbon, March 2009) (pdf)

R. Baldoni et al. Resilient Computing Courseware. Resist NoE Deliverable D38. Technical Report DI/FCUL TR-09-10. May 2009 (abstract/pdf)

R. Baldoni et al. Resilient Computing Curriculum. Resist NoE Deliverable D37. Technical Report DI/FCUL TR-09-9. May 2009 (abstract/pdf)

G. Veronese, M. Correia, A. Bessani, L. C. Lung, P. Verissimo. Minimal Byzantine Fault Tolerance. DI-FCUL TR-2009-15, Dec. 2008. (pdf)

N. F. Neves and P. Veríssimo, Editors. CRUTIAL Deliverable D10 - Preliminary specification of services and protocols. January 2008 (abstract/pdf)

Paulo Sousa and Alysson Neves Bessani and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. Technical Report DI/FCUL TR-07-17. October 2007 (abstract/pdf)

RESIST Network of Excellence Deliverable D13, From Resilience-Building to Resilience-Scaling Technologies: Directions (abstract/pdf)

N. F. Neves and P. Veríssimo, Editors. CRUTIAL Deliverable D4 - Preliminary architecture specification, January 2007 (pdf)

W. Ahrendt, J. Karlsson, R. Jimenez-Peris, U. Voges, H. Pfeifer, G. Lami, F. Giandomenico, Andrea Bondavalli, Paulo Veríssimo, Miguel Correia, P. Palanque, Michel Raynal, C. Cachin, G. Urvoy-Keller, N. Suri, L. Strigini, R. Bloomfield, A. Pataricza, I. Majzik, H. Waeselynck, J. C. Fabre, K. Kanoun, J.-C. Laprie, L. Simoncini, Resilient Computing Curriculum Draft -- ReSIST NoE Deliverable D16. June 2007 (abstract/pdf)

Alysson Neves Bessani and Paulo Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8. April 2007 (abstract/pdf)

Miguel Correia and Nuno F. Neves (editors). Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems. Technical Report DI/FCUL TR-07-5. March 2007 (abstract/pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey. In Resilience-building Technologies: State of Knowledge, RESIST Network of Excellence Deliverable D12, Part Algo, Chapter 1, September 2006. (chapter's pdf) (report abstract/pdf)

Rafael R. Obelheiro, Alysson Neves Bessani, Lau Cheuk Lung, Miguel Correia. How Practical Are Intrusion-Tolerant Systems? Technical Report DI/FCUL TR-06-15. September 2006. (abstract/pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Towards a Dependable Tuple Space. Technical Report DI/FCUL TR-06-4. April 2006. (abstract/pdf)

Gunjan Khanna, Mike Yu Cheng, Jagadeesh Dyaberi, Saurabh Bagchi, Miguel P. Correia, Paulo Verissimo, Probabilistic Diagnosis Through Non-Intrusive Monitoring In Distributed Applications. Technical Report Purdue Univ. TR-ECE-05-19, December 2005. (pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Miguel P. Correia, Paulo J. Verissimo, Saurabh Bagchi. Automated Monitor Based Diagnosis In Distributed System. Technical Report Purdue Univ. TR-ECE-05-13, November 2005. (pdf)

Miguel Correia, Alysson N. Bessani, Nuno F. Neves, Lau C. Lung, Paulo Veríssimo. Improving Byzantine Protocols with Secure Computational Components. Technical Report DI/FCUL TR-05-20. December 2005. (abstract/pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. Technical Report DI/FCUL TR-04-6. Department of Computer Science, University of Lisbon. July 2004. (abstract/pdf) (extended version of the SRDS'04 paper; includes proofs)

M. Correia and N. F. Neves and P. Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Technical Report DI/FCUL TR-04-5. Department of Computer Science, University of Lisbon. June 2004. (abstract/pdf). Revised version as Technical Report DI/FCUL TR-05-14 (asbtract/pdf)

M. Correia and N. F. Neves and L. C. Lung and P. Veríssimo.  Low Complexity Byzantine-Resilient Consensus. Technical Report DI/FCUL TR-03-25. Department of Computer Science, University of Lisbon. August 2003. (abstract/pdf) (older version of the Distributed Computing 2004 consensus paper)

Nuno F. Neves, Paulo Veríssimo, Editors. Complete Specification of APIs and Protocols for the MAFTIA Middleware. Project MAFTIA deliverable D9, July 2002. (abstract/pdf)

Nuno F. Neves, Paulo Veríssimo, Editors. Running Lab Prototype of MAFTIA Middleware. Project MAFTIA deliverable D25, March 2002. (pdf)

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel (Extended Version). DI/FCUL TR 01-12, Department of Computer Science, University of Lisbon, University of Lisbon, December 2001. (abstract/pdf) (extended version of an older version of the EDCC paper)

N. F. Neves and P. Veríssimo, Editors. First Specification of APIs and Protocols for MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D24, August 2001. (abstract/pdf)

P. Veríssimo and N. F. Neves, Editors. Service and Protocol Architecture for the MAFTIA Middleware. Project MAFTIA IST-1999-11583 deliverable D23, January 2001. (abstract/pdf)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. Technical Report DI/FCUL TR-00-6. Department of Computer Science, University of Lisbon. September 2000. (abstract/pdf) (extended version of the ISW-2000 paper)

6. short papers

André Joaquim, Miguel Pardal, Miguel Correia. vtTLS: A Vulnerability-Tolerant Communication Protocol. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Eugénio Silva, Miguel Correia. Implementação de um Sistema de Ficheiros em Nuvem utilizando Criptografia Homomórfica. In INForum 2016, Sep. 2016.

M. Correia. Critical Information Infrastructure Protection: Urgent vs. Important. 2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, Barcelona, Jun. 2012 (pdf)

M. Correia. Software Execution Protection in the Cloud, Keynote at 1st European Workshop on Dependable Cloud Computing (EWDCC 2012), Sibiu, Romania, May 8th 2012 (pdf)

M. Correia, D. G. Ferro, F. Junqueira, M. Serafini. Practical Hardening of Crash-Tolerant Systems. Poster at the 23rd ACM Symposium on Operating Systems Principles (SOSP), October 2011.

A. N. Bessani, V. V. Cogo, M. Correia, P. Costa, M. Pasin, F. Silva, L. Arantes, O. Marin, P. Sens, J. Sopena. Making Hadoop MapReduce Byzantine Fault-Tolerant. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) July 2010. (pdf)

A. Bessani, M. Correia, P. Verissimo. Intrusion Tolerance: The killer application for BFT Protocols (?). BFTW3: Why? When? Where? Workshop on Theory and Practice of Byzantine Fault Tolerance. Elche, Spain, September 22, 2009 (pdf)

Ibéria Medeiros, Miguel Correia. Finding Vulnerabilities in Software Ported from 32 to 64-bit CPUs. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung. From Crash to Byzantine Consensus with 2f + 1 Processes. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Alysson N. Bessani. Byzantine Fault Tolerance with a Spinning Primary. Poster at European Conference on Computer Systems (EuroSys 2009). April 2009.

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung. Byzantine 2f+1 State Machine Replication with COTS Components. Poster at European Conference on Computer Systems (EuroSys 2008). April 2008.

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. On the Effects of Finite Memory on Intrusion-Tolerant Systems. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 401--404. December 2007 (pdf)

Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno F. Neves, Paulo Verissimo. When 3 f +1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. 21st International Symposium on Distributed Computing (DISC 2007). September 2007. (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. Protecting CRUTIAL Things. Fast Abstract at the International Conference on Dependable Systems and Networks, June 2007.

Pan Jieke, João Redol, Miguel Correia. Specification-Based Intrusion Detection System for Carrier Ethernet. In International Conference on Web Information Systems and Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. A System for Protecting CRUTIAL Things. EuroSys 2007 posters (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Brief Announcement: Decoupled Quorum-based Byzantine-resilient Coordination in Open Distributed Systems. 20th International Symposium on Distributed Computing (DISC 2006). September 2006. (pdf)

Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo, Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Lung, Paulo Veríssimo, Byzantine-Resistant Consensus based on a Novel Approach to Intrusion Tolerance, Fast abstract in Supplement of the 10th Pacific Rim International Symposium on Dependable Computing, March 2004. (pdf)

M. Correia, N. F. Neves, L. C. Lung, P. Veríssimo. A Wormhole-based Intrusion-Tolerant Group Communication System - WIT-GCS. The 5th Cabernet Plenary Workshop, November 2003. (pdf) (the system was later renamed to Worm-IT -- see journal papers above)

M. Correia, L. C. Lung, N. F. Neves, P. Veríssimo. A Byzantine-Resilient Protocol using the TTCB. Fast abstract. Supplement of the Fourth European Dependable Computing Conference. Toulouse, France, October 2002. (zipped ps) (ps)

A. Casimiro and M. Correia. Recent Advances on the Timely Computing Base Model. Fast Abstract at the International Conference on Dependable Systems and Networks, Göteborg, Sweden, June 2001. (pdf)

Miguel Correia. Including Confidentiality in a Multimedia QoS Adaptation Architecture (extended abstract). 5th CaberNet Radicals Workshop, Valadares, Porto, Portugal, 5-8 July 1998. (html)

7. thesis

Miguel Correia. Intrusion Tolerance based on Architectural Hybridization. PhD Thesis. Faculdade de Ciências da Universidade de Lisboa, Lisboa, Dezembro de 2003

Miguel Correia. Sincronização Multimédia Intrínseca em Sistemas Distribuídos. Tese de Mestrado. Instituto Superior Técnico, Lisboa, November 1995 ("Intrinsic Multimedia Synchronization in Distributed Systems", MsC Thesis, in portuguese)

home | last update: 29-07-2013