miguel pupo correia           
 

Blockchain and Byzantine Consensus

Byzantine consensus is a problem studied since the later 1970s and Blockchain/cryptocurrencies is arguably its killer application. I have been doing research on Byzantine consensus, state machine replication, intrusion tolerance, and related topics since the early 2000s, often on using trusted components for efficiency, and now I have several ongoing projects on Blockchain.

Funded projects: QualiChain, DE4A, BIG

Current team: Rafael Belchior, João Martins, David Matos, Diogo Vaz

Software prototypes: QualiChain consortium, BlockSim, RITAS, MinBFT, MinZyzzyna, Spinning, EBAWA

Selected publications:

Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. A Survey on Blockchain Interoperability: Past, Present, and Future Trends. ACM Computing Surveys, Vol. 54, Issue 8, November 2022 (abstract, pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo. Efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013 (pdf, software); MinBFT now being implemented by the Hyperledger project!

Ray Neiheiser, Luciana Rech, Manuel Bravo, Luis Rodrigues and Miguel Correia. Fireplug: Efficient and Robust Geo-Replication of Graph Databases. IEEE Transactions on Parallel and Distributed Systems, vol. 31 , n. 8 , Aug. 2020 (pdf)

Henrique Moniz, Nuno F. Neves, M. Correia. Byzantine Fault-Tolerant Consensus in Wireless Ad hoc Networks. IEEE Transactions on Mobile Computing, vol. 12, n. 12, Dec. 2013. (pdf)

Miguel Correia, Nuno F. Neves, Paulo Veríssimo. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Computer Journal. vol. 41, n. 1, pp 82-96, January 2006 (abstract, pdf, software)

Paulo Veríssimo and Nuno Ferreira Neves and Miguel Correia. Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), LNCS 2677, pages 3-36, Springer Verlag, 2003. An extended version is available as DI/FCUL TR03-05 (abstract) (pdf) - A long document introducing the main topics in the area and discussing how to design intrusion-tolerant systems.

Other publications:
Rafael Belchior, Sérgio Guerreiro, André Vasconcelos, Miguel Correia. A Survey on Business Process View Integration: Past, Present, and Future Applications to Blockchain. Business Process Management Journal, Vol. 54, Issue 8, November 2022 (pdf)

Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono. Hermes: Fault-tolerant middleware for blockchain interoperability. Future Generation Computer Systems. Volume 129, Pages 236-251, April 2022. (abstract, pdf)

Mara Caldeira and Miguel Correia. Blockchain Address Transparency with DNS. In Proceedings of the 26th IEEE Symposium on Computers and Communications, September 2021 (pdf).

Rafael Belchior, Miguel Correia, Thomas Hardjono. DLT Gateway Crash Recovery Mechanism, IETF Internet-Draft draft-belchior-gateway-recovery v1, March 2021 (doc)

Sérgio Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, Miguel Correia, Pedro Sousa. Decentralized Business Process Control using Blockchain — An experience report from two applications: Food Supply Chain and Car Registration. Enterprise Modelling and Information Systems Architectures, Volume 15, 2020 (pdf)

Rafael Belchior, Benedikt Putz, Guenther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro, SSIBAC: Self-Sovereign Identity Based Access Control. In 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), December 2020 (pdf).

Filipe Martins, David Matos, Miguel Pardal and Miguel Correia. Recoverable Token: Recovering from Intrusions against Digital Assets in the Ethereum Blockchain. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Network Flows and Performance Counters against Cryptojacking. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Fábio Gomes and Miguel Correia. Cryptojacking Detection with CPU Usage Metrics. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Marcelo Silva, Miguel Correia and Miguel Matos. P2P and Cloud File Storage for Blockchain Applications (short paper). In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Diogo Serranito, André Vasconcelos, Sérgio Guerreiro, Miguel Correia. Blockchain Ecosystem for Verifiable Qualifications. In Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, September 2020 (pdf, video, software).

Note: How does our work compares with similar systems that have been appearing? First, those other systems tend to focus on the problem of the Higher Education Institution (HEI): they provide a platform for each HEI to store an authenticator for their diplomas. On the contrary, we focus on the problem of the contractors: how can they verify certificates from *any* HEI. In those other systems the contractor must obtain a trustworthy version of the endpoint identifier (e.g., a smart contract address) of each HEI, whereas in ours the contractor must obtain only the smart contract address of one smart contract, the consortium smart contract (or one per consortium if there is more than one). That gives the contractor access to trustworthy addresses of the smart contracts of all the HEIs of the consortium. Second, our solution is decentralized: each HEI manages a smart contract, but the consortium smart contract is managed by the consortium, using a consortium smart contract. It is up to the consortium to decide which HEIs can join or leave, as well as the rules for those decisions to happen. If a company provides a similar platform, it is up to the company to decide which HEIs can join/leave and to disseminate their endpoints, thus the solution is centralized.

Rafael Belchior, André Vasconcelos, Miguel Correia. Towards Secure, Decentralized, and Automatic Audits with Blockchain. In Proceedings of the European Conference on Information Systems (ECIS), June 2020 (pdf).

Miguel Correia. From Byzantine Consensus to Blockchain Consensus. In Essentials of Blockchain Technology, Chapter 3, pp. 40-79, CRC Press, 2020. (pdf)

Tiago Rosado, André Vasconcelos, Miguel Correia. A Blockchain Use Case for Car Registration. In Essentials of Blockchain Technology, Chapter 10, pp. 204-233, CRC Press, 2020. (pdf)

Carlos Faria and Miguel Correia. BlockSim: Blockchain Simulator. In IEEE Blockchain Symposium, 2019. (pdf, software)

Rafael Belchior, Miguel Correia, and André Vasconcelos. JusticeChain: Using Blockchain to Protect Justice Logs. 27th International Conference on Cooperative Information Systems - CoopIS 2019. (pdf)

Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís Rodrigues, Miguel Correia. Fireplug: Flexible and Robust N-version Geo-Replication of Graph Databases. In Proceedings of the 32nd International Conference on Information Networking (ICOIN), Jan. 2018. (pdf)

Roberto Ponte, Ibéria Medeiros, and Miguel Correia. Fuzzing Ethereum Smart Contracts (research statement). DSN Workshop on Byzantine Consensus and Resilient Blockchains (BCRB ’18), June 2018

A. Bessani, M. Santos, J. Félix, N. F. Neves, M. Correia. On The Efficiency of Durable State Machine Replication. In Proceedings of the USENIX Annual Technical Conference (ATC), 2013 (pdf)

M. Correia, N. F. Neves, P. Verissimo. BFT-TO: Intrusion Tolerance with Less Replicas. Computer Journal, vol. 56, n. 6, pp. 693-715, June 2013. (pdf)

M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo. Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey. International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011. (pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. RITAS: Services for Randomized Intrusion Tolerance. IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011. (pdf, software)

Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Chicago, USA, June 2010. (pdf)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. In 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010. (pdf, software)

Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung. Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. In Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS). September 2009. (pdf, software)

Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung, Asynchronous Byzantine Consensus with 2f+1 Processes, In Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010. (pdf)

Paulo Verissimo, Miguel Correia, Nuno F. Neves, Paulo Sousa. Intrusion-Resilient Middleware Design and Validation. In Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), pages 615-678, Emerald, 2009. (pdf)

Miguel Correia, Alysson Neves Bessani, Paulo Verissimo. On Byzantine Generals with Alternative Plans. Journal of Parallel and Distributed Computing, Volume 68, Issue 9, pp 1291-1296, Sep. 2008 (abstract, pdf)

H. Moniz and N. F. Neves and M. Correia and P. Veríssimo. Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. In Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems. pages 235-244, Leeds, UK, October 2006 (pdf, software)

Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo. Low Complexity Byzantine-Resilient Consensus. Distributed Computing, vol. 17, n. 3, pp. 237-249, March 2005. (abstract) (pdf)

Nuno F. Neves, Miguel Correia, Paulo Veríssimo. Solving Vector Consensus with a Wormhole. IEEE Transactions on Parallel and Distributed Systems, Volume 16,  Issue 12,  Dec. 2005 pp 1120 - 1131 (pdf)

M. Correia and N. F. Neves and P. Veríssimo. How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004. (pdf) - The paper in which we show how to implement Byzantine fault-tolerant state machine replication with only 2f+1 replicas (or half less one faulty replicas).

Miguel P. Correia. Serviços Distribuídos Tolerantes a Intrusões: resultados recentes e problemas abertos. V Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - Livro Texto dos Minicursos, pp. 113-162, Sociedade Brasileira de Computação, Setembro de 2005 (pdf) (slides) (versão extendida, also as DI-FCUL tech report) - A book chapter surveying work on intrusion-tolerant distributed services (in portuguese).

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


home | last update: 20-05-2021