miguel pupo correia           
 

Trusted Computing

There is a long track of research on using hardware components for increasing the security of computer systems, an area more recently dubbed Trusted Computing. I have been following this line since 2000, with an emphasis on using these components to increase efficiency and resilience of intrusion-tolerant or Byzantine fault-tolerant consensus and replication. More recently I have been exploring the TrustZone and SGX technologies.

Current students: Sileshi Yalew, Daniel Andrade

Software prototypes: MinBFT, MinZyzzyna, EBAWA, TTCB

Selected publications:

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452–465, April 2010. (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 pp 1120 - 1131 (pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf) - The paper in which we show how to implement Byzantine fault-tolerant state machine replication with only 2f+1 replicas (or half less one faulty replicas).

Other publications:

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017. (pdf)

Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Highly-Resilient Services for Critical Infrastructures. In Proceedings of the Workshop on Embedded Systems and Communications Security (ESCS). September 2009. (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237-249, March 2005. (abstract) (pdf)

Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo. Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel. In Proceedings of the Fourth European Dependable Computing Conference. Toulouse, France, pages 234--252, October 2002. (abstract) (zipped ps) (ps) (software)

M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo. Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed Systems. Suita, Japan, pages 2--11, October 2002. (abstract) (zipped ps) (ps)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), pages 24--26, Boston, USA, October 2000. (abstract) (pdf)

Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. In Workshop on Dependable Distributed Data Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004. (pdf)

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


home | last update: 11-11-2017