Miguel Correia

ORCID: 0000-0001-7873-5531
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed systems and fault tolerance
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Cloud Computing and Resource Management
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Cryptography and Data Security
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Optimization and Search Problems
  • Web Application Security Vulnerabilities
  • Age of Information Optimization
  • Opportunistic and Delay-Tolerant Networks
  • Parallel Computing and Optimization Techniques
  • Distributed and Parallel Computing Systems
  • Mobile Ad Hoc Networks
  • Peer-to-Peer Network Technologies
  • Information and Cyber Security
  • Mobile Agent-Based Network Management
  • Smart Grid Security and Resilience
  • Privacy-Preserving Technologies in Data

Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2016-2025

University of Lisbon
2016-2025

Hospitais da Universidade de Coimbra
2023-2025

Instituto Politécnico de Lisboa
2013-2024

Instituto Superior Técnico
2011-2024

Massachusetts Institute of Technology
2024

Film Independent
2024

Duke Kunshan University
2023

Instituto Superior de Tecnologias Avançadas
2023

Hospital Infantil Universitario Niño Jesús
2022-2023

The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these for their needs. Medical record databases, power system historical information and financial are some examples could be moved the cloud. However, reliability security stored in still remain major concerns. In this paper we present DEPSKY, a improves availability, integrity confidentiality through encryption, encoding replication on diverse clouds form cloud-of-clouds....

10.1145/1966445.1966449 article EN 2011-04-10

The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these for their needs. Medical record databases, large biomedical datasets, historical information power systems and financial are some examples could be moved the cloud. However, reliability security stored in still remain major concerns. In this work we present DepSky, a system improves availability, integrity, confidentiality through encryption, encoding, replication on...

10.1145/2535929 article EN ACM Transactions on Storage 2013-11-01

We present two asynchronous Byzantine fault-tolerant state machine replication (BFT) algorithms, which improve previous algorithms in terms of several metrics. First, they require only 2f+1 replicas, instead the usual 3f+1. Second, trusted service this reduction replicas is based quite simple, making a verified implementation straightforward (and even feasible using commercial hardware). Third, nice executions run minimum number communication steps for nonspeculative and speculative...

10.1109/tc.2011.221 article EN IEEE Transactions on Computers 2011-11-17

Cloud Computing is a recent paradigm that creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns security. In public cloud, user's data storage processing no longer done inside its premises, but in centers owned administrated by cloud provider. This may be concern for organizations deal critical data, medical records. We show malicious insider can steal confidential user, so user mostly left trusting...

10.1109/dsnw.2011.5958798 article EN 2011-06-01

Most Byzantine fault-tolerant state machine replication (BFT) algorithms have a primary replica that is in charge of ordering the clients requests. Recently it was shown this dependence allows faulty to degrade performance system small fraction what environment allows. In paper we present Spinning, novel BFT algorithm mitigates such attacks by changing after every batch pending requests accepted for execution. This mode operation deals with those at much lower cost than previous solutions,...

10.1109/srds.2009.36 article EN 2009-09-01

In the past, some research has been done on how to use proactive recovery build intrusion-tolerant replicated systems that are resilient any number of faults, as long recoveries faster than an upper bound fault production assumed at system deployment time. this paper, we propose a complementary approach enhances with additional reactive mechanisms giving correct replicas capability recovering other detected or suspected being compromised. One key feature our proactive-reactive is that,...

10.1109/tpds.2009.83 article EN IEEE Transactions on Parallel and Distributed Systems 2009-06-02

Although a large research effort on web application security has been going for more than decade, the of applications continues to be challenging problem. An important part that problem derives from vulnerable source code, often written in unsafe languages like PHP. Source code static analysis tools are solution find vulnerabilities, but they tend generate false positives, and require considerable programmers manually fix code. We explore use combination methods discover vulnerabilities with...

10.1109/tr.2015.2457411 article EN IEEE Transactions on Reliability 2015-08-17

A blockchain is a distributed ledger in which participants that do not fully trust each other agree on the ledger's content by running consensus algorithm. This technology raising lot of interest both academia and industry, but lack tools to evaluate design implementation decisions may hamper fast progress. To address this issue, paper presents discrete-event simulator flexible enough different implementations. These blockchains can be rapidly modeled simulated extending existing models....

10.1109/blockchain.2019.00067 article EN 2019-07-01

Ineffective data management practices pose serious issues to individuals and companies, e.g., risk of identity theft online exposure. Self-sovereign (SSI) is a new approach that ensures users have full control their personal data. In this work, we alleviate breach user privacy problems by showing how SSI can fit within the context established enterprise access technologies. light recent endeavors, explore use decentralized identifiers, verifiable credentials, blockchains support SSI. We...

10.1109/trustcom50675.2020.00264 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Entrepreneurs, enterprises, and governments are using distributed ledger technology (DLT) as a component of complex information systems, therefore interoperability capabilities required. Interoperating DLTs enable network effects synergies, similarly to the rise Internet, it unlocks full potential technology. However, due novelty area, mechanisms (IMs) still not well understood, is studied in silos. Consequently, choosing proper IM for use case challenging. Our article has three...

10.1145/3564532 article EN Deleted Journal 2022-11-07

The application of dependability concepts and techniques to the design secure distributed systems is raising a considerable amount interest in both communities under designation intrusion tolerance. However, practical intrusion-tolerant replicated based on state machine approach (SMA) can handle at most f Byzantine components out total n = 3f + 1, which maximum resilience asynchronous systems. This paper extends normal system with special oracle called TTCB. Using this extended we manage...

10.1109/reldis.2004.1353018 article EN 2004-01-01

Journal Article From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures Get access Miguel Correia, Correia Faculdade de Ciências da Universidade Lisboa, Campo Grande, 1749-016 Portugal *Corresponding author: mpc@di.fc.ul.pt Search for other works by this author on: Oxford Academic Google Scholar Nuno Ferreira Neves, Neves Paulo Veríssimo The Computer Journal, Volume 49, Issue 1, January 2006, Pages 82–96, https://doi.org/10.1093/comjnl/bxh145 Published:...

10.1093/comjnl/bxh145 article EN The Computer Journal 2005-11-16

Web application security is an important problem in today's internet. A major cause of this status that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to solve use source code static analysis find these bugs, but tools are known report false positives make hard the task correcting application. This paper explores a hybrid methods detect vulnerabilities less positives. After initial step uses taint flag...

10.1145/2566486.2568024 article EN 2014-04-07

Consensus is a classical distributed systems problem with both theoretical and practical interest. Asynchronous Byzantine consensus currently at the core of some solutions for implementation highly-resilient computing services. This paper surveys in message-passing systems, by presenting main results area, classes algorithms discussing important issues like performance resilience these algorithms.

10.1504/ijccbs.2011.041257 article EN International Journal of Critical Computer-Based Systems 2011-01-01

The state of web security remains troubling as applications continue to be favorite targets hackers. Static analysis tools are important mechanisms for programmers deal with this problem they search vulnerabilities automatically in the application source code, allowing remove them. However, developing these requires explicitly coding knowledge about how discover each kind vulnerability. This paper presents a new approach which static learn detect using machine learning. uses sequence model...

10.1145/2931037.2931041 article EN 2016-07-07

The tuple space coordination model is one of the most interesting models for open distributed systems due to its and time decoupling synchronization power. Several works have tried improve dependability spaces through use replication fault tolerance access control security. However, many practical applications in Internet require both This paper describes design implementation DepSpace, a Byzantine fault-tolerant service that provides abstraction. offered by DepSpace secure, reliable...

10.1145/1352592.1352610 article EN 2008-04-01

Critical infrastructures such as the power grid are essentially physical processes controlled by computers connected networks. They're usually vulnerable any other interconnected computer system, but their failure has a high socioeconomic impact. The Utility Infrastructural Resilience (Crutial) project designed an information switch (CIS) to protect these infrastructures. These devices help ensure that incoming and outgoing traffic satisfies security policy of infrastructure in face...

10.1109/msp.2008.158 article EN IEEE Security & Privacy 2008-11-01

The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine fault-tolerant (BFT) can be used with this purpose because they allow replicated systems to continue correct service even when some their replicas fail arbitrarily, either accidentally or due malicious faults. Current BFT perform well on LANs but the are distributed geographically performance is affected by lower bandwidth and higher more...

10.1109/hase.2010.19 article EN 2010-11-01
Coming Soon ...