miguel pupo correia           
 

home

publications by date

publications by topic

students

projects

events

teaching

software

presentations

media coverage


em Português:

informação para potenciais alunos

segurança informática

ensino e investigação
 


AMAZON


FCA, FNAC, WOOK, SUBMARINO

publications by topic

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Most of my publications are on Intrusion Tolerance, also called Byzantine Fault Tolerance. Below I use both expressions with the same meaning: tolerance both to malicious and accidental faults. This list does not include all my publications. For a full list see here.

cloud computing security and dependability

(see also my talks on the topic)

David Matos, Miguel Correia. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf)

Dário Nascimento, Miguel Correia. Shuttle: Intrusion Recovery for PaaS. In Proceedings of the 35th International Conference on Distributed Computing Systems (ICDCS), Jun.-Jul. 2015. (pdf, slides, video)

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015. (pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

Hylson Vescovi Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. In Proceedings of ACM SIGMETRICS 3rd Workshop on Distributed Cloud Computing (DCC), Jun. 2015. (pdf)

A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia, N. Pasin, P. Verissimo. SCFS: a Shared Cloud-backed File System. In Proceedings of Usenix Annual Technical Conference (ATC), 2014. (pdf)

Miguel Correia. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. In Euro-Par 2013: Parallel Processing Workshops, Lecture Notes in Computer Science Volume 8374, pp 95-104, 2014 (pdf)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud, IEEE Computer Society Press, March 2013.

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Transactions on Storage, vol. 9, n. 4, Nov. 2013. (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In Proceedings of the European Conference on Computer Systems (EuroSys 2011). April 2011. (pdf)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud, IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011. (abstract/pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf) Best Paper Award

Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo. On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. In First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), Oct. 2012 (pdf)

F. Rocha, M. Correia. Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV, with DSN'11), Hong Kong, June 2011. (pdf)

G.. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

M. Correia. Software Execution Protection in the Cloud, Keynote at 1st European Workshop on Dependable Cloud Computing (EWDCC 2012), Sibiu, Romania, May 8th 2012 (pdf)

Miguel Correia, Daniel G. Ferro, Flavio Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems, In Proceedings of the Usenix Annual Technical Conference (ATC), 2012 (pdf)

intrusion tolerance (generic)

Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa. Intrusion-Resilient Middleware Design and Validation. In Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), pages 615-678, Emerald, 2009. (pdf)

Paulo Veríssimo and Nuno Ferreira Neves and Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer Verlag, 2003. An extended version is available as DI/FCUL TR03-05 (abstract) (pdf) - A long document introducing the main topics in the area and discussing how to design intrusion-tolerant systems.

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

Miguel P. Correia. Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos. V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade Brasileira de Computação, Setembro de 2005 (pdf) (slides) (versão extendida, also as DI-FCUL tech report) - A book chapter surveying work on intrusion-tolerant distributed services (in portuguese).

See also: intrusion-tolerant systems/algorithms with wormholes, randomized intrusion-tolerant algorithms, Byzantine consensus, other intrusion-tolerant systems/algorithms, performance of intrusion-tolerant systems

software security

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software, FCA editores. Setembro de 2010.

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities. In Proceedings of the IEEE International Symposium on Software Testing and Analysis (ISSTA), Jul. 2016. (pdf)

Christine Blakemore, João Redol, Miguel Correia. Fingerprinting for Web Applications: from Devices to Related Groups. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Equipping WAP with WEAPONS to Detect Vulnerabilities. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2016. (pdf)

Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. Hacking the DBMS to Prevent Injection Attacks. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, March 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54–69, March 2016. (pdf)

I. Medeiros, N. F. Neves, M. Correia. Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives. In Proceedings of 23rd International World Wide Web Conference, 2014. (pdf)

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

S. Nunes, M. Correia. Web Application Risk Awareness with High Interaction Honeypots. In Actas do INForum – Simpósio de Informática 2010. Braga, Setembro de 2010. (pdf)

Ibéria Medeiros, Miguel Correia. Finding Vulnerabilities in Software Ported from 32 to 64-bit CPUs. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

J. Antunes and N. F. Neves and M. Correia and P. Veríssimo and R. Neves. Vulnerability Removal with Attack Injection. IEEE Transactions on Software Engineering, vol. 36, n. 3, pp. 357–370, March 2010. (pdf)

N. F. Neves and J. Antunes and M. Correia and P. Veríssimo and R. Neves. Using Attack Injection to Discover New Vulnerabilities. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 457-466, June 2006. (pdf)

critical infrastructure protection

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452–465, April 2010. (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. The CRUTIAL Way of Critical Infrastructure Protection. IEEE Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), Jun 2009. (pdf)

Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), Jul 2009. (pdf)

Paulo Veríssimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. In Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)

P. Verissimo, N. F. Neves, M. Correia, Y. Deswarte, A. Abou El Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for Critical Information Infrastructures. In Architecting Dependable Systems V, R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS 5135, pp 1-27. Springer Verlag, 2008. (pdf)

Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL reference critical information infrastructure architecture: a blueprint. International Journal of System of Systems Engineering, vol. 1, n. 1/2, pp 78-95, 2008. (selected as one of the best papers from the 2006 First International Workshop on Critical Information Infrastructures Security) (abstract) (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007 (pdf)

P. Veríssimo, N. F. Neves and M. Correia. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. In CRITIS'06 1st International Workshop on Critical Information Infrastructures Security, pages 1-14, Samos Island, Greece, August 30 - September 2, 2006 (pdf)

Alysson Neves Bessani and Paulo Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8. April 2007 (abstract/pdf)

intrusion-tolerant systems/algorithms with wormholes

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf) - The paper in which we show how to implement Byzantine fault-tolerant state machine replication with only 2f+1 replicas (or half less one faulty replicas).

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Highly-Resilient Services for Critical Infrastructures. In Proceedings of the Workshop on Embedded Systems and Communications Security (ESCS). September 2009. (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007 (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 Page(s):1120 - 1131 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237--249, March 2005. (abstract) (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract) (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. Finite Memory: a Vulnerability of Intrusion-Tolerant Systems. In Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA). July 2008 (pdf)

Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo. On the Effects of Finite Memory on Intrusion-Tolerant Systems. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 401--404. December 2007 (pdf)

Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo. Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel. In Proceedings of the Fourth European Dependable Computing Conference. Toulouse, France, pages 234--252, October 2002. (abstract) (zipped ps) (ps) (software)

M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo. Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed Systems. Suita, Japan, pages 2--11, October 2002. (abstract) (zipped ps) (ps)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), pages 24--26, Boston, USA, October 2000. (abstract) (pdf)

Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. In Workshop on Dependable Distributed Data Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004. (pdf)

See also: intrusion tolerance (generic)

randomized intrusion-tolerant algorithms

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

Henrique Moniz, Nuno Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures, Distributed Computing, 24(3-4), pp. 165-175, 2011.

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Henrique Moniz, Nuno F. Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC). September 2009. (pdf)  Best Student Paper Award

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010.

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno F. Neves, Paulo Verissimo. When 3 f +1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. 21st International Symposium on Distributed Computing (DISC 2007). September 2007. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 568-577, June 2006. (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract) (pdf)

See also: intrusion tolerance (generic)

Byzantine consensus

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract) (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract) (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 Page(s)1120 - 1131 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237--249, March 2005. (abstract) (pdf)

See also: intrusion tolerance (generic)

wireless ad-hoc networks

Henrique Moniz, Nuno Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures, Distributed Computing, 24(3-4), pp. 165-175, 2011.

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Henrique Moniz, Nuno F. Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC). September 2009. (pdf)  Best Student Paper Award

Henrique Moniz, Alessandra Tedeschi, Nuno Ferreira Neves, Miguel Correia. A Distributed Systems Approach to Airborne Self-Separation. In Computational Models, Software Engineering and Advanced Technologies in Air Transportation: Next Generation Applications, edited by Li Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI Global, October 2009. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

other intrusion-tolerant/Byzantine fault-tolerant systems/algorithms

Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos. In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

A. F. Luiz, L. C. Lung, M. Correia, MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)

F. Dettoni, L. C. Lung, M. Correia, A. F. Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin Virtual Machines. In Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC), Jul. 2013 (pdf)

Xavier Vilaça, João Leitão, Miguel Correia, Luís Rodrigues. N-party BAR Transfer. In Proceedings of the 15th International Conference On Principles of Distributed Systems (OPODIS), Dec. 2011 (pdf)

Aldelir Luiz, Lau Cheuk Lung and Miguel Correia. Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA). July 2011 (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One’s Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS). September 2009. (pdf)

A. N. Bessani, P. Sousa, M. Correia. Active Quorum Systems. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), October 2010. (pdf)

See also: intrusion tolerance (generic)

coordination / tuple spaces

Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space. IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug. 2009. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract) (pdf)

Alysson Neves Bessani, Eduardo Pelison Alchieri, Miguel Correia, Joni Silva Fraga. DepSpace: a Byzantine fault-tolerant coordination service. ACM SIGOPS Operating Systems Review, vol. 42 , issue 4, pages 163-176, May 2008. Appeared also in the Proceedings of the European Conference on Computer Systems (EuroSys 2008). April 2008. (abstract) (pdf) (software)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Decoupled Quorum-based Byzantine-Resilient Coordination in Open Distributed Systems. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 231-238, July 2007. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. In Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006. (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Towards a Dependable Tuple Space. Technical Report DI/FCUL TR-06-4. April 2006. (abstract) (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Brief Announcement: Decoupled Quorum-based Byzantine-resilient Coordination in Open Distributed Systems. 20th International Symposium on Distributed Computing (DISC 2006). September 2006. (pdf)

performance of intrusion-tolerant systems

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating Byzantine Quorum Systems. In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS), pages 253-264. October 2007. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 568-577, June 2006. (pdf)

See also: intrusion tolerance (generic)

fault monitoring and diagnosis

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007 (abstract) (pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Miguel P. Correia, Paulo J. Verissimo, Saurabh Bagchi. Automated Monitor Based Diagnosis In Distributed System. Technical Report Purdue Univ. TR-ECE-05-13 (pdf)

intrusion detection

Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015.

G. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

Pan Jieke, João Redol, Miguel Correia. Specification-Based Intrusion Detection System for Carrier Ethernet. In International Conference on Web Information Systems and Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)

delay-tolerant networks

Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia, Betweenness centrality in delay tolerant networks: A survey. Ad Hoc Networks, 33, pp. 284-305, 2015.

Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia, A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks. Applied Soft Computing, 30, pp. 104-112, 2015. (online).

Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)

N. Magaia, P. R. Pereira, M. Correia. Nodes' Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Selfish and Malicious Behavior in Delay Tolerant Networks. In Proceedings of Future Network and Mobile Summit 2013, July 2013 (pdf)

grid computing

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia. GridTS: A New Approach for Fault Tolerant Scheduling in Grid Computing. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 187-194, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. In Proceedings of the 10th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC), pages 403-411. May 2007. (pdf)

F. Favarim and L. C. Lung and J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser Computational Grids based on Tuple Spaces. In International Workshop on Dependability in Service-oriented Grids (WODSOG). October 1st, 2006, Leeds, UK (pdf)

distributed multimedia

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. QoS control: an application integrated framework. In Proceedings of the 1st IEEE International Conference on ATM (ICATM´98), Colmar, France, June 1998. (abstract)(ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. An architecture for dynamic multimedia QoS control. In Proceedings of the 7th IFIP/ICCC Conference on Information Networks and Data Applications (INDC´98), Aveiro, Portugal, June 1998. (abstract) (ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. Integrated dynamic QoS control for multimedia applications. In International Symposium SYBEN'98, Broadband Networks and Multimedia Systems, Zurich, Switzerland, May 1998. (abstract) (ps.gz)

Miguel Correia, Paulo Pinto. Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract) (ps.gz)

home | last update: 29-07-2013