miguel pupo correia           
 

other publications by topic

My research is focused on (cyber)security and dependability (aka fault tolerance), typically in distributed systems, in the context of different applications (blockchain, cloud, mobile). I'm particularly interested in the fault/intrusion tolerance approach, in which systems have to continue to operate correctly irrespectively of the occurrence of faults, attacks, and intrusions. This list does not include all my publications. For a full list see here.


Blockchain and Byzantine Consensus

Byzantine consensus is a problem studied since the later 1970s and Blockchain/cryptocurrencies is arguably its killer application. I have been doing research on Byzantine consensus, state machine replication, intrusion tolerance, and related topics since the early 2000s, often on using trusted components for efficiency, and now I have several ongoing projects on Blockchain.

Current students: Carlos Faria, António Tavares, Paulo Anjos, Tiago Rosado, Jorge Alves, Luís Pereira, Pedro Martins

Software prototypes: RITAS, MinBFT, MinZyzzyna, Spinning, EBAWA

Selected publications:

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf)

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract) (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237-249, March 2005. (abstract) (pdf)

Paulo Veríssimo and Nuno Ferreira Neves and Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer Verlag, 2003. An extended version is available as DI/FCUL TR03-05 (abstract) (pdf) - A long document introducing the main topics in the area and discussing how to design intrusion-tolerant systems.

Other publications:

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa. Intrusion-Resilient Middleware Design and Validation. In Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), pages 615-678, Emerald, 2009. (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract) (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 pp 1120 - 1131 (pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf) - The paper in which we show how to implement Byzantine fault-tolerant state machine replication with only 2f+1 replicas (or half less one faulty replicas).

Miguel P. Correia. Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos. V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade Brasileira de Computação, Setembro de 2005 (pdf) (slides) (versão extendida, also as DI-FCUL tech report) - A book chapter surveying work on intrusion-tolerant distributed services (in portuguese).

Cloud Security and Dependability

Cloud computing resulted in many security and dependability challenges, but also new opportunities for exploring diversity. I have been working on these topics since 2010, mostly on storage in several clouds, large-scale data processing in several clouds, and intrusion recovery.

Key funded projects: SafeCloud

Current students: David Matos, Pedro Costa

Software prototypes: DepSky, SCFS, Chrysaor, Medusa, Shuttle

Selected publications:

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Transactions on Storage, vol. 9, n. 4, Nov. 2013. (pdf)

A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia, N. Pasin, P. Verissimo. SCFS: a Shared Cloud-backed File System. In Proceedings of Usenix Annual Technical Conference (ATC), 2014. (pdf)

David Matos, Miguel Pardal, and Miguel Correia. Rectify: Black-Box Intrusion Recovery in PaaS Clouds. In Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference, Dec. 2017. (pdf)

Pedro Costa, Fernando Ramos, and Miguel Correia. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, vol. 4(4) pp. 74-82, July/August 2017. (pdf)

Dário Nascimento, Miguel Correia. Shuttle: Intrusion Recovery for PaaS. In Proceedings of the 35th International Conference on Distributed Computing Systems (ICDCS), Jun.-Jul. 2015. (pdf, slides, video)

Other publications:

Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf) Best Student Paper Award

Hylson V. Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza. State machine replication in containers managed by Kubernetes. Journal of Systems Architecture, Volume 73, Pages 1-60, Feb. 2017. (online)

David Matos, Miguel Correia. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

Hylson Vescovi Netto, Tulio Alberton Ribeiro, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. In Proceedings of ACM SIGMETRICS 3rd Workshop on Distributed Cloud Computing (DCC), Jun. 2015. (pdf)

Miguel Correia. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. In Euro-Par 2013: Parallel Processing Workshops, Lecture Notes in Computer Science Volume 8374, pp 95-104, 2014 (pdf)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud, IEEE Computer Society Press, March 2013.

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf)

A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In Proceedings of the European Conference on Computer Systems (EuroSys 2011). April 2011. (pdf)

Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud, IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011. (abstract/pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf) Best Paper Award

Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo. On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. In First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), Oct. 2012 (pdf)

F. Rocha, M. Correia. Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV, with DSN'11), Hong Kong, June 2011. (pdf)

Trusted Computing

There is a long track of research on using hardware components for increasing the security of computer systems, an area more recently dubbed Trusted Computing. I have been following this line since 2000, with an emphasis on using these components to increase efficiency and resilience of intrusion-tolerant or Byzantine fault-tolerant consensus and replication. More recently I have been exploring the TrustZone and SGX technologies.

Current students: Sileshi Yalew, Daniel Andrade

Software prototypes: MinBFT, MinZyzzyna, EBAWA, TTCB

Selected publications:

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452–465, April 2010. (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 pp 1120 - 1131 (pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf) - The paper in which we show how to implement Byzantine fault-tolerant state machine replication with only 2f+1 replicas (or half less one faulty replicas).

Other publications:

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017. (pdf)

Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Highly-Resilient Services for Critical Infrastructures. In Proceedings of the Workshop on Embedded Systems and Communications Security (ESCS). September 2009. (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System. Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007 (pdf)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237-249, March 2005. (abstract) (pdf)

Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo. Wormhole-Aware Byzantine Protocols. 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004. (pdf)

M. Correia, P. Veríssimo, Nuno F. Neves. The Design of a COTS Real-Time Distributed Security Kernel. In Proceedings of the Fourth European Dependable Computing Conference. Toulouse, France, pages 234--252, October 2002. (abstract) (zipped ps) (ps) (software)

M. Correia and L. C. Lung and N. F. Neves and P. Veríssimo. Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. In Proceedings of the 21th IEEE Symposium on Reliable Distributed Systems. Suita, Japan, pages 2--11, October 2002. (abstract) (zipped ps) (ps)

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. The Middleware Architecture of MAFTIA: A Blueprint. In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), pages 24--26, Boston, USA, October 2000. (abstract) (pdf)

Rafael Ferraz, Bruno Gonçalves, João Sequeira, Miguel Correia, Nuno F. Neves, Paulo Veríssimo. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. In Workshop on Dependable Distributed Data Management, in conjuction with SRDS'04, Florianopolis, Brasil, pages 45-50, October 2004. (pdf)

Software Security

The (in)security of software is not only a research topic, but a societal challenge. I created and starting teaching a course in the area in 2004 and doing research a few years later, with special emphasis on web application security.

Current students: Tatjana Lide, Roberto Ponte, Diogo Pereira, Anabela Borges

Software prototypes: WAP

Selected publications:

Ibéria Medeiros, Miguel Beatriz, Nuno Neves and Miguel Correia. Hacking the DBMS to Prevent Injection Attacks. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, March 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Transactions on Reliability, 65(1):54–69, March 2016. (pdf)

I. Medeiros, N. F. Neves, M. Correia. Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives. In Proceedings of 23rd International World Wide Web Conference, 2014. (pdf)

J. Antunes and N. F. Neves and M. Correia and P. Veríssimo and R. Neves. Vulnerability Removal with Attack Injection. IEEE Transactions on Software Engineering, vol. 36, n. 3, pp. 357–370, March 2010. (pdf)

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese), FCA editores. 2a Edição Atualizada e Aumentada, Set. 2017.

Other publications:

Paulo Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia and Marco Vieira. On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. In Proceedings of the 13th European Dependable Computing Conference (EDCC 2017), Sep. 2017. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Demonstrating a Tool for Injection Attack Prevention in MySQL. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2017. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities. In Proceedings of the IEEE International Symposium on Software Testing and Analysis (ISSTA), Jul. 2016. (pdf)

Christine Blakemore, João Redol, Miguel Correia. Fingerprinting for Web Applications: from Devices to Related Groups. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2016. (pdf)

Ibéria Medeiros, Nuno F. Neves, Miguel Correia. Equipping WAP with WEAPONS to Detect Vulnerabilities. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2016. (pdf)

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

S. Nunes, M. Correia. Web Application Risk Awareness with High Interaction Honeypots. In Actas do INForum – Simpósio de Informática 2010. Braga, Setembro de 2010. (pdf)

Ibéria Medeiros, Miguel Correia. Finding Vulnerabilities in Software Ported from 32 to 64-bit CPUs. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), (fast abstract) Jun-Jul 2009. (pdf)

N. F. Neves and J. Antunes and M. Correia and P. Veríssimo and R. Neves. Using Attack Injection to Discover New Vulnerabilities. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 457-466, June 2006. (pdf)

Miguel Pupo Correia e Paulo Jorge Sousa. Segurança no Software (Software Security, in Portuguese), FCA editores. Set. 2010.

Mobile Security and Dependability

Smartphones appeared just one decade ago and tablets are even more recent, but the security of such devices, their applications and operating systems (e.g., Android) have become extremely important. I did work on running consensus with such devices in the late 2000s and more recently become interested on using the TrustZone security extension to increase application security in such devices.

Key funded projects: PCAS

Current students: Sileshi Yalew, Daniel Andrade

Selected publications:

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. In Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, Oct. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. In Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2017. (pdf)

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf)

Henrique Moniz, Nuno F. Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC). September 2009. (pdf)  Best Student Paper Award

Other publications:

Sileshi D. Yalew, Pedro Mendonça, Gerald Maguire Jr., Seif Haridi, Miguel Correia. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Sileshi D. Yalew, Gerald Maguire Jr., Seif Haridi, Miguel Correia. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. In Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2017. (pdf)

Henrique Moniz, Nuno Neves, Miguel Correia, Paulo Verissimo. Randomization Can Be a Healer: Consensus with Dynamic Omission Failures, Distributed Computing, 24(3-4), pp. 165-175, 2011.

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Henrique Moniz, Alessandra Tedeschi, Nuno Ferreira Neves, Miguel Correia. A Distributed Systems Approach to Airborne Self-Separation. In Computational Models, Software Engineering and Advanced Technologies in Air Transportation: Next Generation Applications, edited by Li Weigang, Alexandre G. de Barros and Ítalo R. de Oliveira, IGI Global, October 2009. (pdf)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 357-364. December 2007 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Randomized Intrusion-Tolerant Asynchronous Services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 568-577, June 2006. (pdf)

Big Data Security Analytics and Intrusion Detection

The amount of existing data is growing so large that this become a research area (“big data”) and an opportunity also in terms of cybersecurity. I have been doing research on these topics along three lines: analytics techniques, platforms for large-scale data processing, and intrusion detection.

Current students: Luís Dias, Arnaldo Gouveia, Pedro Costa, João Amado, Hélder Reia

Selected publications:

Pedro Costa, Fernando Ramos, and Miguel Correia. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, vol. 4(4) pp. 74-82, July/August 2017. (pdf)

Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf) Best Student Paper Award

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015.

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf)

Other publications:

Arnaldo Gouveia, Miguel Correia. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. In Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), Jun. 2017. (pdf)

Diogo Frazão, João Redol, and Miguel Correia. PARADISE: Modular Click Fraud Detection. In 2017 European Security Conference: Cybersecurity Analytics, Jun. 2017.

Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf) Best Paper Award

G. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

Pan Jieke, João Redol, Miguel Correia. Specification-Based Intrusion Detection System for Carrier Ethernet. In International Conference on Web Information Systems and Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)

Secure and Dependable Communications

My research on intrusion-tolerant or Byzantine fault-tolerant system has led me to get interested in applying similar ideas for protecting communications. I have been exploring mostly security and dependability of Internet and opportunistic (aka delay-tolerant) networks.

Funded projects: SafeCloud

Current students: Isabel Costa, Ricardo Moura, Pedro Madeira

Software prototypes: MACHETE, vtTLS, Jiter

Selected publications:

Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. In Proceedings of the IFIP Networking Conference, Jun. 2017. (pdf)

Diogo Raposo, Miguel Pardal, Luís Rodrigues, Miguel Correia. MACHETE: Multi-path Communication for Security. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Karan Balu, Miguel Pardal, Miguel Correia. DARSHANA: Detecting Route Hijacking For Communication Confidentiality. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Alysson Bessani, Nuno F. Neves, Paulo Veríssimo, Wagner Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia. JITeR: Just-in-time application-layer routing. Computer Networks, Volume 104, Pages 122–136, 20 July 2016. (download, preprint pdf)

Naércio Magaia, Nuno Horta, Rui Neves, Paulo Rogério Pereira, Miguel Correia, A Multi-Objective Routing Algorithm for Wireless Multimedia Sensor Networks. Applied Soft Computing, 30, pp. 104-112, 2015. (online).

Other publications:

Naércio Magaia, Paulo Pereira, Miguel Correia. REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks. In Proceedings of the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2017), Nov. 2017. (pdf)

André Joaquim, Miguel Pardal, Miguel Correia. vtTLS: A Vulnerability-Tolerant Communication Protocol. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Naércio Magaia, Alexandre Francisco, Paulo Pereira, Miguel Correia, Betweenness centrality in delay tolerant networks: A survey. Ad Hoc Networks, 33, pp. 284-305, 2015.

Naércio Magaia, Paulo Pereira, Miguel Correia. Security in Delay-Tolerant Mobile Cyber-Physical Applications. In Cyber Physical Systems: From Theory to Practice Auerbach Publications, CRC Press, to appear, 2015. (pdf)

N. Magaia, P. R. Pereira, M. Correia. Nodes' Misbehavior in Vehicular Delay-Tolerant Networks. In Proceedings of CFIC 2013 The Conference on Future Internet Communications, May 2013 (pdf)

N. Magaia, P. R. Pereira, M. Correia. Selfish and Malicious Behavior in Delay Tolerant Networks. In Proceedings of Future Network and Mobile Summit 2013, July 2013 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), Jun 2009. (pdf)

Critical Infrastructure Protection

I. Medeiros, N. F. Neves, M. Correia. Securing Energy Metering Software with Automatic Source Code Correction. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Jul. 2013 (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452–465, April 2010. (pdf)

Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. The CRUTIAL Way of Critical Infrastructure Protection. IEEE Security & Privacy, vol.6, n.6, Nov/Dec. 2008 (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Miguel Correia. Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), Jun 2009. (pdf)

Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves. Intrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), Jul 2009. (pdf)

Paulo Veríssimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa. Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. In Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009. (pdf)

P. Verissimo, N. F. Neves, M. Correia, Y. Deswarte, A. Abou El Kalam, A. Bondavalli, A. Daidone. The CRUTIAL Architecture for Critical Information Infrastructures. In Architecting Dependable Systems V, R. de Lemos, F. Di Giandomenico, C. Gacek, H. Muccini, M. Vieira (eds.), LNCS 5135, pp 1-27. Springer Verlag, 2008. (pdf)

Paulo Verissimo, Nuno F. Neves, Miguel Correia. The CRUTIAL reference critical information infrastructure architecture: a blueprint. International Journal of System of Systems Engineering, vol. 1, n. 1/2, pp 78-95, 2008. (selected as one of the best papers from the 2006 First International Workshop on Critical Information Infrastructures Security) (abstract) (pdf)

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007 (pdf)

P. Veríssimo, N. F. Neves and M. Correia. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. In CRITIS'06 1st International Workshop on Critical Information Infrastructures Security, pages 1-14, Samos Island, Greece, August 30 - September 2, 2006 (pdf)

Alysson Neves Bessani and Paulo Sousa and Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo. Intrusion-Tolerant Protection for Critical Infrastructures. Technical Report DI/FCUL TR-07-8. April 2007 (abstract/pdf)

Other Byzantine Fault-Tolerant Systems / Algorithms

Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos. Priority-Based State Machine Replication with PRaxos. In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, March 2016. (pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

A. F. Luiz, L. C. Lung, M. Correia, MITRA: Byzantine Fault-Tolerant Middleware for Transaction Processing on Replicated Databases. SIGMOD Record, vol. 43, n. 1, Mar. 2014. (pdf)

F. Dettoni, L. C. Lung, M. Correia, A. F. Luiz. Byzantine Fault-Tolerant State Machine Replication with Twin Virtual Machines. In Proceedings of the 8th IEEE Symposium on Computers and Communications (ISCC), Jul. 2013 (pdf)

Miguel Correia, Daniel G. Ferro, Flavio Junqueira, Marco Serafini. Practical Hardening of Crash-Tolerant Systems, In Proceedings of the Usenix Annual Technical Conference (ATC), 2012 (pdf)

Xavier Vilaça, João Leitão, Miguel Correia, Luís Rodrigues. N-party BAR Transfer. In Proceedings of the 15th International Conference On Principles of Distributed Systems (OPODIS), Dec. 2011 (pdf)

Aldelir Luiz, Lau Cheuk Lung and Miguel Correia. Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA). July 2011 (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One’s Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS). September 2009. (pdf)

A. N. Bessani, P. Sousa, M. Correia. Active Quorum Systems. In Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), October 2010. (pdf)

Coordination Services

Eugénio Silva, Miguel Correia. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. An Efficient Byzantine-Resilient Tuple Space. IEEE Transactions on Computers, vol. 58, no. 8, pp. 1080-1094, Aug. 2009. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. IEEE Transactions on Parallel and Distributed Systems vol. 20, no. 3, pp. 419-432, Mar. 2009 (abstract) (pdf)

Alysson Neves Bessani, Eduardo Pelison Alchieri, Miguel Correia, Joni Silva Fraga. DepSpace: a Byzantine fault-tolerant coordination service. ACM SIGOPS Operating Systems Review, vol. 42 , issue 4, pages 163-176, May 2008. Appeared also in the Proceedings of the European Conference on Computer Systems (EuroSys 2008). April 2008. (abstract) (pdf) (software)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Decoupled Quorum-based Byzantine-Resilient Coordination in Open Distributed Systems. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 231-238, July 2007. (pdf)

Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia. Evaluating Byzantine Quorum Systems. In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS), pages 253-264. October 2007. (pdf)

A.N.Bessani and M.Correia and J.S.Fraga and L.C.Lung. Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. In Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006. (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Towards a Dependable Tuple Space. Technical Report DI/FCUL TR-06-4. April 2006. (abstract) (pdf)

Alysson Neves Bessani and Miguel Correia and Joni da Silva Fraga and  L. C. Lung. Brief Announcement: Decoupled Quorum-based Byzantine-resilient Coordination in Open Distributed Systems. 20th International Symposium on Distributed Computing (DISC 2006). September 2006. (pdf)

Fault Monitoring and Diagnosis

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo J. Veríssimo, Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007 (abstract) (pdf)

Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Miguel P. Correia, Paulo J. Verissimo, Saurabh Bagchi. Automated Monitor Based Diagnosis In Distributed System. Technical Report Purdue Univ. TR-ECE-05-13 (pdf)

Grid Computing

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia. GridTS: A New Approach for Fault Tolerant Scheduling in Grid Computing. In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 187-194, July 2007. (pdf)

Fábio Favarim, Joni Fraga, Lau C. Lung, Miguel Correia, João F. Santos. Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. In Proceedings of the 10th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC), pages 403-411. May 2007. (pdf)

F. Favarim and L. C. Lung and J. da S. Fraga and M. Correia. Fault-Tolerant Multiuser Computational Grids based on Tuple Spaces. In International Workshop on Dependability in Service-oriented Grids (WODSOG). October 1st, 2006, Leeds, UK (pdf)

Distributed Multimedia

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. QoS control: an application integrated framework. In Proceedings of the 1st IEEE International Conference on ATM (ICATM´98), Colmar, France, June 1998. (abstract)(ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. An architecture for dynamic multimedia QoS control. In Proceedings of the 7th IFIP/ICCC Conference on Information Networks and Data Applications (INDC´98), Aveiro, Portugal, June 1998. (abstract) (ps.gz)

João Bom, Paulo Marques, Miguel Correia, Paulo Pinto. Integrated dynamic QoS control for multimedia applications. In International Symposium SYBEN'98, Broadband Networks and Multimedia Systems, Zurich, Switzerland, May 1998. (abstract) (ps.gz)

Miguel Correia, Paulo Pinto. Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 95. S. Francisco, Nov. 1995. (abstract) (ps.gz)

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


home | last update: 11-11-2017