???global.info.a_carregar???
Miguel Correia is Associate Professor with Habilitation (Agregação) at Instituto Superior Técnico (IST) of Universidade de Lisboa (ULisboa), in Lisboa, Portugal. He is a Senior Researcher at INESC-ID, in the Distributed Systems Group (GSD). He is co-founder of Blockbird Ventures, a startup in the Blockchain market. He is a non-executive member of the Board of Associação .PT. He has a PhD in Computer Science from the Universidade de Lisboa Faculdade de Ciências. He has been involved in several international and national research projects related to cybersecurity, including the QualiChain, SPARTA, SafeCloud, PCAS, TCLOUDS, ReSIST, CRUTIAL, and MAFTIA European projects. He has more than 150 publications and is Senior Member of the IEEE. His research focuses on cybersecurity and dependability (aka fault tolerance), typically in distributed systems, in the context of different applications (blockchain, cloud, mobile). He is particularly interested in the fault/intrusion tolerance approach, in which systems have to continue to operate correctly irrespectively of the occurrence of faults, attacks, and intrusions. His main research topics are: blockchain and Byzantine consensus, cloud security and dependability, trusted computing, software security, mobile security and dependability, big data security analytics and intrusion detection, and secure and dependable communications.
Identificação

Identificação pessoal

Nome completo
Miguel Nuno Dias Alves Pupo Correia

Nomes de citação

  • Correia, Miguel

Identificadores de autor

Ciência ID
3D1F-A7CC-1320
ORCID iD
0000-0001-7873-5531

Websites

  • http://www.gsd.inesc-id.pt/~mpc/ (Profissional)

Idiomas

Idioma Conversação Leitura Escrita Compreensão Peer-review
Inglês Utilizador proficiente (C1) Utilizador proficiente (C1) Utilizador proficiente (C1) Utilizador proficiente (C1)
Espanhol; Castelhano Utilizador elementar (A1) Utilizador proficiente (C1) Utilizador elementar (A1) Utilizador elementar (A1)
Formação
Grau Classificação
2018
Concluído
Agregação em Engenharia Informática e de Computadores (Título de Agregado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
"From Byzantine Consensus to Blockchains" (TESE/DISSERTAÇÃO)
Aprovado por unanimidade
2003
Concluído
PhD in Informatics (Doutoramento)
Universidade de Lisboa Faculdade de Ciências, Portugal
"Intrusion Tolerance based on Architectural Hybridization" (TESE/DISSERTAÇÃO)
A (Aprovado com Distinção e Louvor)
1995
Concluído
MSc in Electrotechnical and Computing Engineering (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
"Intrinsic Multimedia Synchronization in Distributed Systems" (TESE/DISSERTAÇÃO)
A (Muito bom)
1991
Concluído
Bachelor in Electrotechnical and Computing Engineering (Licenciatura)
Universidade de Lisboa Instituto Superior Técnico, Portugal
"Test equipment for X.25 public data networks" (TESE/DISSERTAÇÃO)
B (15)
Percurso profissional

Ciência

2011/01/01 - Atual Investigador (Investigação)
Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento em Lisboa, Portugal
1998/01/01 - 2010/12/31 Investigador (Investigação)
Universidade de Lisboa Laboratório de Sistemas Informáticos de Grande Escala, Portugal
1991/12/01 - 1997/07/31 Investigador (Investigação)
Instituto de Engenharia de Sistemas e Computadores, Portugal

Docência no Ensino Superior

2011/05/01 - Atual Professor Associado (Docente Universitário)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2003/12/01 - 2011/04/30 Professor Auxiliar (Docente Universitário)
Universidade de Lisboa Faculdade de Ciências, Portugal
1997/08/01 - 2003/12/01 Assistente (Docente Universitário)
Universidade de Lisboa Faculdade de Ciências, Portugal

Cargos e Funções

2018/05/01 - Atual National representative at the European Blockchain Partnership
Governo da República Portuguesa Ministério da Ciência Tecnologia e Ensino Superior, Portugal
2020/07/01 - 2021/12/31 Co-Chair of the European Blockchain Partnership
Governo da República Portuguesa Ministério da Ciência Tecnologia e Ensino Superior, Portugal
Projetos

Bolsa

Designação Financiadores
2019 - 2022/02 SPARTA - Special projects for advanced research and technology in Europe
830892
European Commission
2019 - 2021/12 QualiChain - Decentralised Qualifications' Verification and Management for Learner Empowerment, Education Reengineering and Public Sector Transformation
822404
European Commission
2018 - 2021/07 SEAL - SEcurity progrAmming of web appLications
AAC-2/SAICT/2017-029058
Fundação para a Ciência e a Tecnologia
2018 - 2021/05 Angainor - reproducible large-scale evaluation and fault injection
UID/CEC/50021/2013
Fundação para a Ciência e a Tecnologia
2018 - 2021/05 Cosmos - Causal Consistency on the Network Edge
PTDC/EEI-COM/29271/2017
Fundação para a Ciência e a Tecnologia
2016 - 2019/06 ABYSS - Autonomic Byzantine Fault-Tolerant Systems
PTDC/EEI-SCR/1741/2014
Fundação para a Ciência e a Tecnologia
2016 - 2019/06 SATURN - Spatio­temporal cloud store for big­data applications
PTDC/EEI-SCR/1743/2014
Fundação para a Ciência e a Tecnologia
2015 - 2018/08 SafeCloud - Secure and Resilient Cloud Architecture
653884
European Commission
2013 - 2016/09 PCAS - Personalised Centralized Authentication System
610713
European Commission
2013 - 2016/07 LEAD Clouds - Large Efficient And Dependable Clouds
400511/2013-4
CAPES / CNPQ
2010 - 2014/03 TRONE - Trustworthy and Resilient Operations in a Network Environment
Provided by PTCRIS: 110953
Fundação para a Ciência e a Tecnologia
2011 - 2013/12 Resilient Computing in the Clouds - RC-Clouds
Provided by PTCRIS: 115211
Fundação para a Ciência e a Tecnologia
2010 - 2013/09 TCLOUDS - Trustworthy Clouds – Privacy and Resilience for Internet-scale Critical Infrastructure
257243
European Commission
2010 - 2012/12 Diverse - Diversity for Intrusion Tolerant Systems
Provided by PTCRIS: 100894
Fundação para a Ciência e a Tecnologia
2010 - 2012/12 REGENESYS - Regeneration of Replicated Systems
Provided by PTCRIS: 100581
Fundação para a Ciência e a Tecnologia
2000 - 2009/03 MAFTIA -- Malicious- and Accidental-Fault Tolerance for Internet Applications
11583
European Commission
2006 - 2008/12 ReSIST - Resilience for Survivability in IST
026764
European Commission
2006 - 2008/12 CRUTIAL - CRitical UTility InfrastructurAL Resilience
027513
European Commission
2005 - 2007/12 AJECT: Attack Injection on Software Components
Provided by PTCRIS: 61643
Fundação para a Ciência e a Tecnologia
2005 - 2007/12 RITAS - Randomized Intrusion Tolerance for Asynchronous Systems
Provided by PTCRIS: 60334
Fundação para a Ciência e a Tecnologia
2001 - 2003/12 DeFeATS -- Distributed Fault and Attack Tolerant Systems configuration
POSI/CHS/33996/1999
Fundação para a Ciência e a Tecnologia
Produções

Publicações

Artigo em conferência
  1. Luís Dias; Hélder Reia; Rui Neves; Miguel Correia. "OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms". Trabalho apresentado em 13th International Conference on Network and System Security, 2019.
    10.1007/978-3-030-36938-5_12
  2. Erick Lavoie; Laurie J. Hendren; Frederic Desprez; Correia, Miguel. "Pando: Personal Volunteer Computing in Browsers". Trabalho apresentado em 2019 ACM/IFIP/USENIX International Middleware Conference, 2019.
  3. Rafael Belchior; André Vasconcelos; Correia, Miguel. "JusticeChain: Using Blockchain to Protect Justice Logs". Trabalho apresentado em 27th International Conference on Cooperative Information Systems - CoopIS 2019, 2019.
  4. Carlos Faria; Correia, Miguel. "BlockSim: Blockchain Simulator". Trabalho apresentado em IEEE Blockchain Symposium, 2019.
  5. Erick Lavoie; Laurie J. Hendren; Frederic Desprez; Correia, Miguel. "Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC". Trabalho apresentado em IEEE International Conference on Self-Adaptive and Self-Organizing Systems - SASO 2019, 2019.
  6. David Matos; Miguel Pardal; Correia, Miguel. "RockFS: Cloud-backed File System Resilience to Client-Side Attacks". Trabalho apresentado em 2018 ACM/IFIP/USENIX International Middleware Conference, 2018.
  7. Filipe Apolinário; Miguel Pardal; Correia, Miguel. "S-Audit: Efficient Data Integrity Verification for Cloud Storage". Trabalho apresentado em Trustcom 2018, 2018.
  8. Correia, Miguel; Ray Neiheiser; Daniel Presser; Luciana Rech; Manuel Bravo; Luís Eduardo Teixeira Rodrigues. "Fireplug: Flexible and Robust N-version Geo-Replication of Graph Databases". Trabalho apresentado em Proceedings of the 32nd International Conference on Information Networking (ICOIN), 2018.
  9. Luís Sacramento; Ibéria Medeiros; João Bota; Correia, Miguel. "FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows". Trabalho apresentado em IEEE TrustCom, 2018.
  10. Duarte, Nuno O.; Yalew, Sileshi Demesie; Santos, Nuno; Correia, Miguel. "Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions". Trabalho apresentado em 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18, 2018.
    10.1145/3286978.3287015
  11. Guerra, Miguel; Taubmann, Benjamin; Reiser, Hans P.; Yalew, Sileshi; Correia, Miguel. "Introspection for ARM TrustZone with the ITZ Library". Trabalho apresentado em 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2018.
    10.1109/qrs.2018.00026
  12. Netto, Hylson Vescovi; Luiz, Aldelir Fernando; Correia, Miguel; de Oliveira Rech, Luciana; Oliveira, Caio Pereira. "Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes". 2018.
    10.1109/iscc.2018.8538452
  13. Matos, David R.; Pardal, Miguel L.; Adão, Pedro; Silva, António Rito; Correia, Miguel. "Securing Electronic Health Records in the Cloud". Trabalho apresentado em 1st Workshop on Privacy by Design in Distributed Systems - W-P2DS'18, 2018.
    10.1145/3195258.3195259
  14. Correia, Miguel; David Matos; Miguel Pardal. "Rectify: Black-Box Intrusion Recovery in PaaS Clouds". Trabalho apresentado em Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference, 2017.
  15. Correia, Miguel; André Joaquim; Miguel Pardal. "Vulnerability-Tolerant Transport Layer Security". Trabalho apresentado em Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS), 2017.
  16. Correia, Miguel. "REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks". Trabalho apresentado em 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2017), 2017.
  17. Correia, Miguel. "TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps". Trabalho apresentado em 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2017.
  18. Correia, Miguel. "DroidPosture: A Trusted Posture Assessment Service for Mobile Devices". Trabalho apresentado em 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2017.
  19. Correia, Miguel. "Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid". Trabalho apresentado em 16th IEEE International Symposium on Network Computing and Applications, 2017.
  20. Correia, Miguel. "On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study". Trabalho apresentado em 13th European Dependable Computing Conference (EDCC 2017), 2017.
  21. Correia, Miguel. "Xor-Based Topology Management Beyond Kademlia". Trabalho apresentado em 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2017.
  22. Correia, Miguel. "T2Droid: A TrustZone-based Dynamic Analyser for Android Applications". Trabalho apresentado em 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2017.
  23. Correia, Miguel. "A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection". Trabalho apresentado em International Work-Conference on Artificial Neural Networks (IWANN), 2017.
  24. Correia, Miguel. "PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks". Trabalho apresentado em IFIP Networking Conference, 2017.
  25. Ibéria Medeiros; Nuno F. Neves; Correia, Miguel. "Demonstrating a Tool for Injection Attack Prevention in MySQL". Trabalho apresentado em IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017.
  26. Correia, Miguel. "Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce". Trabalho apresentado em 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2017.
  27. Matos, D.; Correia, M.. "NoSQL Undo: Recovering NoSQL databases by undoing operations". Trabalho apresentado em 15th IEEE International Symposium on Network Computing and Applications (NCA), 2016.
    10.1109/NCA.2016.7778616
  28. Costa, P.A.R.S.; Bai, X.; Ramos, F.M.V.; Correia, M.. "Medusa: An Efficient Cloud Fault-Tolerant MapReduce". Trabalho apresentado em Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2016.
    10.1109/CCGrid.2016.20
  29. Filho, P.R.P.; De Oliveira Rech, L.; Lung, L.C.; Correia, M.; Camargos, L.J.. "Priority-based state machine replication with PRaxos". Trabalho apresentado em Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016.
    10.1109/AINA.2016.63
  30. Medeiros, I.; Neves, N.; Correia, M.. "Equipping WAP with WEAPONS to detect vulnerabilities: Practical experience report". 2016.
    10.1109/DSN.2016.63
  31. Medeiros, I.; Beatriz, M.; Neves, N.; Correia, M.. "Hacking the DBMS to prevent injection attacks". 2016.
    10.1145/2857705.2857723
  32. Medeiros, I.; Neves, N.; Correia, M.. "DEKANT: A static analysis tool that learns to detect web application vulnerabilities". 2016.
    10.1145/2931037.2931041
  33. Yalew, S.D.; Maguire, G.Q.; Correia, M.. "Light-SPD: A platform to prototype secure mobile applications". 2016.
    10.1145/2940343.2940349
  34. Silva, E.A.; Correia, M.. "Leveraging an homomorphic encryption library to implement a coordination service". Trabalho apresentado em 15th IEEE International Symposium on Network Computing and Applications (NCA), 2016.
    10.1109/NCA.2016.7778590
  35. Balu, K.; Pardal, M.L.; Correia, M.. "DARSHANA: Detecting route hijacking for communication confidentiality". Trabalho apresentado em Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), 2016.
    10.1109/NCA.2016.7778593
  36. Raposo, D.; Pardal, M.L.; Rodrigues, L.; Correia, M.. "MACHETE: Multi-path communication for security". Trabalho apresentado em 15th IEEE International Symposium on Network Computing and Applications (NCA), 2016.
    10.1109/NCA.2016.7778594
  37. Gouveia, A.; Correia, M.. "Feature set tuning in statistical learning network intrusion detection". Trabalho apresentado em 15th IEEE International Symposium on Network Computing and Applications (NCA), 2016.
    10.1109/NCA.2016.7778595
  38. Presser, D.; Lung, L.C.; Correia, M.. "Greft: Arbitrary Fault-Tolerant Distributed Graph Processing". 2015.
    10.1109/BigDataCongress.2015.73
  39. Gonçalves, D.; Bota, J.; Correia, M.. "Big data analytics for detecting host misbehavior in large logs". 2015.
    10.1109/Trustcom.2015.380
  40. Nascimento, D.; Correia, M.. "Shuttle: Intrusion Recovery for PaaS". 2015.
    10.1109/ICDCS.2015.72
  41. Netto, H.V.; Lung, L.C.; Ribeiro, T.A.; Correia, M.; Luiz, A.F.. "Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage". 2015.
    10.1145/2847220.2847226
  42. Correia, M.; Mittal, N.. "Cloud computing dependability: Report and extended papers of the second international workshop on dependability issues in cloud computing". 2014.
    10.1145/2694737.2694739
  43. Medeiros, I.; Neves, N.F.; Correia, M.. "Automatic detection and correction of Web application vulnerabilities using data mining to predict false positives". 2014.
    10.1145/2566486.2568024
  44. Magaia, N.; Pereira, P.R.; Correia, M.P.. "Nodes' misbehavior in Vehicular Delay-Tolerant Networks". 2013.
    10.1109/CFIC.2013.6566325
  45. Medeiros, I.; Neves, N.F.; Correia, M.. "Securing energy metering software with automatic source code correction". 2013.
    10.1109/INDIN.2013.6622969
  46. Dettoni, F.; Lung, L.C.; Correia, M.; Luiz, A.F.. "Byzantine fault-tolerant state machine replication with twin virtual machines". 2013.
    10.1109/ISCC.2013.6754979
  47. Magaia, N.; Pereira, P.R.; Correia, M.P.. "Selfish and malicious behavior in delay-tolerant networks". Trabalho apresentado em Proceedings of Future Network and Mobile Summit 2013, 2013.
  48. Correia, M.P.. "Message from the program committee chair". 2012.
    10.1109/EDCC.2012.5
  49. Correia, M.. "Software execution protection in the cloud". 2012.
    10.1145/2365316.2365323
  50. Correia, M.; Costa, P.; Pasin, M.; Bessani, A.; Ramos, F.; Verissimo, P.. "On the feasibility of byzantine fault-tolerant mapreduce in clouds-of-clouds". 2012.
    10.1109/SRDS.2012.46
  51. Costa, P.; Pasin, M.; Bessani, A.N.; Correia, M.. "Byzantine fault-tolerant MapReduce: Faults are not just crashes". 2011.
    10.1109/CloudCom.2011.15
  52. Bessani, A.; Correia, M.; Quaresma, B.; André, F.; Sousa, P.. "DEPSKY: Dependable and secure storage in a cloud-of-clouds". 2011.
    10.1145/1966445.1966449
  53. Rocha, F.; Correia, M.. "Lucy in the sky without diamonds: Stealing confidential data in the cloud". 2011.
    10.1109/DSNW.2011.5958798
  54. Nascimento, G.; Correia, M.. "Anomaly-based intrusion detection in software as a service". 2011.
    10.1109/DSNW.2011.5958858
  55. Luiz, A.F.; Lung, L.C.; Correia, M.. "Byzantine fault-tolerant transaction processing for replicated databases". 2011.
    10.1109/NCA.2011.19
  56. Vilaça, X.; Leitão, J.; Correia, M.; Rodrigues, L.. "N-party BAR transfer". Trabalho apresentado em 15th International Conference On Principles of Distributed Systems (OPODIS), 2011.
    10.1007/978-3-642-25873-2_27
  57. Correia, M.; Pal, P.. "4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010". 2010.
    10.1109/DSNW.2010.5542605
  58. Stumm Júnior, V.; Lung, L.C.; Correia, M.; Da Silva Fraga, J.; Lau, J.. "Intrusion tolerant services through virtualization: A shared memory approach". 2010.
    10.1109/AINA.2010.87
  59. Correia, M.; Veronese, G.S.; Lung, L.C.. "Asynchronous Byzantine consensus with 2f+1 processes". 2010.
    10.1145/1774088.1774187
  60. Moniz, H.; Neves, N.F.; Correia, M.. "Turquois: Byzantine consensus in wireless ad hoc networks". 2010.
    10.1109/DSN.2010.5544268
  61. Correia, M.; Pal, P.. "4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010". 2010.
    10.1109/DSN.2010.5544420
  62. Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C.. "EBAWA: Efficient byzantine agreement for wide-area networks". 2010.
    10.1109/HASE.2010.19
  63. Moniz, H.; Neves, N.F.; Correia, M.; Veríssimo, P.. "Randomization Can Be a Healer: Consensus with Dynamic Omission Failures - Best Student Paper Award". Trabalho apresentado em 23rd International Symposium on Distributed Computing (DISC), 2009.
    10.23919/ecc.2013.6669089
  64. Verissimo, P.; Bessani, A.N.; Correia, M.; Neves, N.F.; Sousa, P.. "Designing modular and redundant cyber architectures for process control: Lessons learned". 2009.
    10.1109/HICSS.2009.150
  65. Bagchi, S.; Correia, M.; Pal, P.. "3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009". 2009.
    10.1109/DSN.2009.5270281
  66. Sousa, P.; Bessani, A.N.; Dantas, W.S.; Souto, F.; Correia, M.; Neves, N.F.. "Intrusion-tolerant self-healing devices for critical infrastructure protection". 2009.
    10.1109/DSN.2009.5270333
  67. Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C.. "Spin one's wheels? Byzantine fault tolerance with a spinning primary". 2009.
    10.1109/SRDS.2009.36
  68. Bessani, A.N.; Alchieri, E.P.; Correia, M.; Fraga, J.S.. "DepSpace: A byzantine fault-tolerant coordination service". 2008.
    10.1145/1357010.1352610
  69. Veronese, G.S.; Correia, M.; Lau, C.L.; Verissimo, P.. "Finite memory: A vulnerability of intrusion-tolerant systems". 2008.
    10.1109/NCA.2008.40
  70. Bessani, A.N.; Alchieri, E.P.; Correia, M.; Fraga, J.S.. "DepSpace: A byzantine fault-tolerant coordination service". 2008.
    10.1145/1352592.1352610
  71. Favarim, F.; Da Silva Fraga, J.; Lung, L.C.; Correia, M.; Santos, J.F.. "Exploiting tuple spaces to provide fault-tolerant scheduling on computational grids". 2007.
    10.1109/ISORC.2007.37
  72. Bessani, A.N.; Correia, M.; Da Silva Fraga, J.; Lung, L.C.. "Decoupled quorum-based byzantine-resilient coordination in open distributed systems". 2007.
    10.1109/NCA.2007.14
  73. Dantas, W.S.; Bessani, A.N.; Da Silva Fraga, J.; Correia, M.. "Evaluating Byzantine quorum systems". 2007.
    10.1109/SRDS.2007.4365701
  74. Veronese, G.S.; Correia, M.; Lung, L.C.; Verissimo, P.. "On the effects of finite memory on intrusion-tolerant systems". 2007.
    10.1109/PRDC.2007.51
  75. Favarim, F.; Da Silva Fraga, J.; Lung, L.C.; Correia, M.. "GridTS: A new approach for fault-tolerant scheduling in grid computing". 2007.
    10.1109/NCA.2007.27
  76. Moniz, H.; Neves, N.F.; Correia, M.; Casimiro, A.; Veríssimo, P.. "Intrusion tolerance in wireless environments: An experimental evaluation". 2007.
    10.1109/PRDC.2007.46
  77. Sousa, P.; Bessani, A.N.; Correia, M.; Neves, N.F.; Verissimo, P.. "Resilient intrusion tolerance through proactive and reactive recovery". 2007.
    10.1109/PRDC.2007.59
  78. Jieke, P.; Redol, J.; Correia, M.. "Specification-based intrusion detection system for carrier ethernet". Trabalho apresentado em Webist 2007 - 3rd International Conference on Web Information Systems and Technologies, Proceedings, 2007.
  79. Lung, L.C.; Favarim, F.; Santos, G.T.; Correia, M.. "An infrastructure for adaptive fault tolerance on FT-CORBA". 2006.
    10.1109/ISORC.2006.
  80. Moniz, H.; Neves, N.F.; Correia, M.; Veríssimo, P.. "Experimental comparison of local and shared coin randomized consensus protocols". 2006.
    10.1109/SRDS.2006.19
  81. Bessani, A.N.; Correia, M.; Da Silva Fraga, J.; Lung, L.C.. "Sharing memory between Byzantine processes using policy-enforced tuple spaces". 2006.
    10.1109/ICDCS.2006.76
  82. Moniz, H.; Neves, N.F.; Correia, M.; Verissimo, P.. "Randomized intrusion-tolerant asynchronous services". 2006.
    10.1109/DSN.2006.60
  83. Neves, N.; Antunes, J.; Correia, M.; Veríssimo, P.; Neves, R.. "Using attack injection to discover new vulnerabilities". 2006.
    10.1109/DSN.2006.72
  84. Bessani, A.N.; Correia, M.; Da Silva Fraga, J.; Lau, C.L.. "Brief announcement: Decoupled quorum-based byzantine-resilient coordination in open distributed systems". Trabalho apresentado em 20th International Symposium on Distributed Computing (DISC 2006), 2006.
  85. Veríssimo, P.; Neves, N.F.; Correia, M.. "CRUTIAL: The blueprint of a reference critical information infrastructure architecture". Trabalho apresentado em CRITIS'06 1st International Workshop on Critical Information Infrastructures Security, 2006.
    10.1007/11962977_1
  86. Bessani, A.N.; Correia, M.; Moniz, H.; Neves, N.F.; Verissimo, P.. "When 3f + 1 is not enough: Tradeoffs for decentralized asynchronous byzantine consensus". Trabalho apresentado em 21st International Symposium on Distributed Computing, 2005.
  87. Correia, M.; Neves, N.F.; Veríssimo, P.. "How to tolerate half less one byzantine nodes in practical distributed systems". Trabalho apresentado em Proceedings of the IEEE Symposium on Reliable Distributed Systems, 2004.
  88. Correia, M.; Veríssimo, P.; Neves, N.F.. "The design of a COTS real-time distributed security kernel". Trabalho apresentado em Fourth European Dependable Computing Conference (EDCC), 2002.
  89. Correia, M.; Lung, L.C.; Neves, N.F.; Veríssimo, P.. "Efficient Byzantine-resilient reliable multicast on a hybrid failure model". 2001.
    10.1109/RELDIS.2002.1180168
  90. Correia, M.; Veríssino, P.; Neves, N.F.. "The architecture of a secure group communication system based on intrusion tolerance". 2001.
    10.1109/CDCS.2001.918681
  91. Bom, J.; Marques, P.; Correia, M.; Pinto, P.. "Integrated dynamic QoS control for multimedia applications". 1998.
    10.1117/12.321914
  92. Correia, Miguel; Pinto, Paulo. "Low-level multimedia synchronization algorithms on broadband networks". Trabalho apresentado em Proceedings of the ACM International Multimedia Conference & Exhibition, 1995.
Artigo em revista
  1. Ray Neiheiser; Luciana Rech; Manuel Bravo; Luis Rodrigues; Miguel Correia. "Fireplug: Efficient and Robust Geo-Replication of Graph Databases". IEEE Transactions on Parallel and Distributed Systems 31 8 (2020): 1942-1953. https://doi.org/10.1109/TPDS.2020.2981019.
    10.1109/TPDS.2020.2981019
  2. Iberia Medeiros; Miguel Beatriz; Nuno Neves; Miguel Correia. "SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS". IEEE Transactions on Reliability 68 3 (2019): 1168-1188. https://doi.org/10.1109/TR.2019.2900007.
    10.1109/TR.2019.2900007
  3. Naercio Magaia; Carlos Borrego; Paulo Rogerio Pereira; Miguel Correia. "ePRIVO: An Enhanced PRIvacy-preserVing Opportunistic Routing Protocol for Vehicular Delay-Tolerant Networks". IEEE Transactions on Vehicular Technology 67 11 (2018): 11154-11168. https://doi.org/10.1109/TVT.2018.2870113.
    10.1109/TVT.2018.2870113
  4. Paulo Nunes; Iberia Medeiros; Jose C. Fonseca; Nuno Neves; Miguel Correia; Marco Vieira. "Benchmarking Static Analysis Tools for Web Security". IEEE Transactions on Reliability 67 3 (2018): 1159-1175. https://doi.org/10.1109/TR.2018.2839339.
    10.1109/TR.2018.2839339
  5. Netto, H.V.; Lung, L.C.; Correia, M.; Luiz, A.F.; Sá de Souza, L.M.. "State machine replication in containers managed by Kubernetes". Journal of Systems Architecture 73 (2017): 53-59. http://www.scopus.com/inward/record.url?eid=2-s2.0-85009278874&partnerID=MN8TOARS.
    10.1016/j.sysarc.2016.12.007
  6. Alysson Bessani; Nuno F. Neves; Paulo Veríssimo; Wagner Dantas; Alexandre Fonseca; Rui Silva; Pedro Luz; Miguel Correia. "JITeR: Just-In-Time Application-Layer Routing". Computer Networks (2016):
    10.1016/j.comnet.2016.05.010
  7. Correia, Miguel. "A multi-objective routing algorithm for Wireless Multimedia Sensor Networks". Applied Soft Computing (2015):
    10.1016/j.asoc.2015.01.052
  8. Magaia, N.; Francisco, A.P.; Pereira, P.; Correia, M.. "Betweenness centrality in Delay Tolerant Networks: A survey". Ad Hoc Networks 33 (2015): 284-305. http://www.scopus.com/inward/record.url?eid=2-s2.0-84941878376&partnerID=MN8TOARS.
    10.1016/j.adhoc.2015.05.002
  9. Luiz, A.F.; Lung, L.C.; Correia, M.. "MITRA: Byzantine fault-tolerant middleware for transaction processing on replicated databases". SIGMOD Record 43 1 (2014): 32-38. http://www.scopus.com/inward/record.url?eid=2-s2.0-84901650281&partnerID=MN8TOARS.
    10.1145/2627692.2627699
  10. Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C.; Verissimo, P.. "Efficient byzantine fault-tolerance". IEEE Transactions on Computers 62 1 (2013): 16-30. http://www.scopus.com/inward/record.url?eid=2-s2.0-84870530606&partnerID=MN8TOARS.
    10.1109/TC.2011.221
  11. Correia, M.; Neves, N.F.; Verissimo, P.. "BFT-TO: Intrusion tolerance with less replicas". Computer Journal 56 6 (2013): 693-715. http://www.scopus.com/inward/record.url?eid=2-s2.0-84878614685&partnerID=MN8TOARS.
    10.1093/comjnl/bxs148
  12. Costa, P.; Pasin, M.; Bessani, A.N.; Correia, M.P.. "On the performance of byzantine fault-tolerant mapreduce". IEEE Transactions on Dependable and Secure Computing 10 5 (2013): 301-313. http://www.scopus.com/inward/record.url?eid=2-s2.0-84883749059&partnerID=MN8TOARS.
    10.1109/TDSC.2013.7
  13. Bessani, A.; Correia, M.; Quaresma, B.; Andre, F.; Sousa, P.. "DepSky: Dependable and secure storage in a cloud-of-clouds". ACM Transactions on Storage 9 4 (2013): http://www.scopus.com/inward/record.url?eid=2-s2.0-84886483953&partnerID=MN8TOARS.
    10.1145/2535929
  14. Moniz, H.; Neves, N.F.; Correia, M.. "Byzantine fault-tolerant consensus in wireless Ad Hoc networks". IEEE Transactions on Mobile Computing 12 12 (2013): 2441-2454. http://www.scopus.com/inward/record.url?eid=2-s2.0-84887846390&partnerID=MN8TOARS.
    10.1109/TMC.2012.225
  15. Correia, M.; Veronese, G.S.; Neves, N.F.; Verissimo, P.. "Byzantine consensus in asynchronous message-passing systems: A survey". International Journal of Critical Computer-Based Systems 2 2 (2011): 141-161. http://www.scopus.com/inward/record.url?eid=2-s2.0-84862687363&partnerID=MN8TOARS.
    10.1504/IJCCBS.2011.041257
  16. Moniz, H.; Neves, N.F.; Correia, M.; Verissimo, P.. "RITAS: Services for randomized intrusion tolerance". IEEE Transactions on Dependable and Secure Computing 8 1 (2011): 122-136. http://www.scopus.com/inward/record.url?eid=2-s2.0-78649351966&partnerID=MN8TOARS.
    10.1109/TDSC.2008.76
  17. Moniz, H.; Neves, N.F.; Correia, M.; Veríssimo, P.. "Randomization can be a healer: Consensus with dynamic omission failures". Distributed Computing 24 3-4 (2011): 165-175. http://www.scopus.com/inward/record.url?eid=2-s2.0-84855549972&partnerID=MN8TOARS.
    10.1007/s00446-010-0116-2
  18. Sousa, P.; Bessani, A.N.; Correia, M.; Neves, N.F.; Verissimo, P.. "Highly available intrusion-tolerant services with proactive-reactive recovery". IEEE Transactions on Parallel and Distributed Systems 21 4 (2010): 452-465. http://www.scopus.com/inward/record.url?eid=2-s2.0-77649269780&partnerID=MN8TOARS.
    10.1109/TPDS.2009.83
  19. Antunes, J.; Neves, N.; Correia, M.; Verissimo, P.; Neves, R.. "Vulnerability discovery with attack injection". IEEE Transactions on Software Engineering 36 3 (2010): 357-370. http://www.scopus.com/inward/record.url?eid=2-s2.0-77953120554&partnerID=MN8TOARS.
    10.1109/TSE.2009.91
  20. Bessani, A.N.; Correia, M.; Fraga, J.D.S.; Lung, L.C.. "An efficient byzantine-resilient tuple space". IEEE Transactions on Computers 58 8 (2009): 1080-1095. http://www.scopus.com/inward/record.url?eid=2-s2.0-77955082441&partnerID=MN8TOARS.
    10.1109/TC.2009.71
  21. Bessani, A.N.; Correia, M.; da Silva Fraga, J.; Cheuk Lung, L.. "Sharing memory between byzantine processes using policy-enforced tuple spaces". IEEE Transactions on Parallel and Distributed Systems 20 3 (2009): 419-432. http://www.scopus.com/inward/record.url?eid=2-s2.0-60449093761&partnerID=MN8TOARS.
    10.1109/TPDS.2008.96
  22. Correia, M.; Bessani, A.N.; Veríssimo, P.. "On Byzantine generals with alternative plans". Journal of Parallel and Distributed Computing 68 9 (2008): 1291-1296. http://www.scopus.com/inward/record.url?eid=2-s2.0-48849084135&partnerID=MN8TOARS.
    10.1016/j.jpdc.2008.04.008
  23. Veríssimo, P.; Neves, N.F.; Correia, M.. "The CRUTIAL reference critical information infrastructure architecture: A blueprint". International Journal of System of Systems Engineering 1 1-2 (2008): 78-95. http://www.scopus.com/inward/record.url?eid=2-s2.0-51849150631&partnerID=MN8TOARS.
    10.1504/IJSSE.2008.018132
  24. Correia, M.; Neves, N.F.; Lung, L.C.; Veríssimo, P.. "Worm-IT - A wormhole-based intrusion-tolerant group communication system". Journal of Systems and Software 80 2 (2007): 178-197. http://www.scopus.com/inward/record.url?eid=2-s2.0-33846035707&partnerID=MN8TOARS.
    10.1016/j.jss.2006.03.034
  25. Khanna, G.; Cheng, M.Y.; Varadharajan, P.; Bagchi, S.; Correia, M.P.; Veríssimo, P.J.. "Automated rule-based diagnosis through a distributed monitor system". IEEE Transactions on Dependable and Secure Computing 4 4 (2007): 266-279. http://www.scopus.com/inward/record.url?eid=2-s2.0-36248945561&partnerID=MN8TOARS.
    10.1109/TDSC.2007.70211
  26. Correia, M.; Neves, N.F.; Veríssimo, P.. "From consensus to atomic broadcast: Time-free byzantine-resistant protocols without signatures". Computer Journal 49 1 (2006): 82-96. http://www.scopus.com/inward/record.url?eid=2-s2.0-30444456076&partnerID=MN8TOARS.
    10.1093/comjnl/bxh145
  27. Correia, M.; Neves, N.F.; Lung, L.C.; Veríssimo, P.. "Low complexity Byzantine-resilient consensus". Distributed Computing 17 3 (2005): 237-249. http://www.scopus.com/inward/record.url?eid=2-s2.0-17044416157&partnerID=MN8TOARS.
    10.1007/s00446-004-0110-7
  28. Neves, N.F.; Correia, M.; Veríssimo, P.. "Solving vector consensus with a wormhole". IEEE Transactions on Parallel and Distributed Systems 16 12 (2005): 1120-1131. http://www.scopus.com/inward/record.url?eid=2-s2.0-30344433440&partnerID=MN8TOARS.
    10.1109/TPDS.2005.153
Artigo em revista (magazine)
  1. Pedro Costa; Fernando M. V. Ramos; Correia, Miguel. "On the Design of Resilient Multicloud MapReduce", IEEE Cloud Computing, 2017
  2. Francisco Rocha; Salvador Abreu; Correia, Miguel. "The final frontier: Confidentiality and privacy in the cloud", IEEE Computer, 2011
  3. Bessani, A.N.; Sousa, P.; Correia, M.; Neves, N.F.; Verssimo, P.. "The crutial way of critical infrastructure protection", IEEE Security and Privacy, 2008, http://www.scopus.com/inward/record.url?eid=2-s2.0-58849119555&partnerID=MN8TOARS.
    10.1109/MSP.2008.158
Capítulo de livro
  1. Luis Dias; Correia, Miguel. "Big Data Analytics for Intrusion Detection: An Overview". In Handbook of Research on Machine and Deep Learning Applications for Cyber Security. IGI Global, 2020.
  2. Luís Sacramento; Ibéria Medeiros; João Bota; Correia, Miguel. "Detecting Botnets and Unknown Network Attacks in Big Traffic Data". In Botnets: Architectures, Countermeasures, and Challenges. CRC Press, 2020.
  3. Tiago Rosado; André Vasconcelos; Correia, Miguel. "A Blockchain Use Case for Car Registration". In Essentials of Blockchain Technology. CRC Press, 2020.
  4. Correia, Miguel. "From Byzantine Consensus to Blockchain Consensus". In Essentials of Blockchain Technology. CRC Press, 2020.
  5. Ricardo Moura; David R. Matos; Miguel L. Pardal; Miguel Correia. "MultiTLS: Secure Communication Channels with Cipher Suite Diversity". 2020.
    10.1007/978-3-030-58201-2_5
  6. Naércio Magaia; Paulo Pereira; Correia, Miguel. "Security in Delay-Tolerant Mobile Cyber-Physical Applications". In Cyber Physical Systems: From Theory to Practice. CRC Press, 2015.
  7. Correia, M.. "Clouds-of-clouds for dependability and security: Geo-replication meets the cloud". In Euro-Par 2013: Parallel Processing Workshops. 2014.
    10.1007/978-3-642-54420-0_10
  8. Moniz, H.; Tedeschi, A.; Neves, N.F.; Correia, M.. "A distributed systems approach to airborne self-separation". In Computational Models, Software Engineering and Advanced Technologies in Air Transportation: Next Generation Applications. 2009.
    10.4018/978-1-60566-800-0.ch011
  9. Paulo Verissimo; Correia, Miguel; Nuno F. Neves; Paulo Sousa. "Intrusion-Resilient Middleware Design and Validation". In Information Assurance, Security and Privacy Services. 2009.
  10. Veríssimo, P.; Neves, N.F.; Correia, M.; Deswarte, Y.; El Kalam, A.A.; Bondavalli, A.; Daidone, A.. "The CRUTIAL architecture for critical information infrastructures". In Architecting Dependable Systems V. 2008.
    10.1007/978-3-540-85571-2_1
  11. Veríssimo, P.E.; Neves, N.F.; Correia, M.P.. "Intrusion-tolerant architectures: Concepts and design". In Lecture Notes in Computer Science, 3-36. 2003.
Edição de livro
  1. Aris Gkoulalas-Divanis; Correia, Miguel; Mirco Marchetti; Dimiter R. Avresky. Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE. 2018.
  2. Aris Gkoulalas-Divanis; Correia, Miguel; Dimiter R. Avresky. Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). 2017.
  3. Correia, M.; Mittal, N.. 2nd International Workshop on Dependability Issues in Cloud Computing, DISCCO 2013. 2013.
  4. Correia, Miguel. Proceedings Ninth European Dependable Computing Conference - EDCC 2012. IEEE. 2012.
  5. Correia, Miguel; Luis Soares Barbosa. Actas do INForum - Simpósio de Informática 2010. 2010.
  6. Correia, M.; Martin, J.-P.. WRAITS 2008 - Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems - In Conjunction with the European Conference on Computer Systems: Foreword. 2008.
Livro
  1. Correia, Miguel; Paulo Sousa. Segurança no Software. FCA. 2017.
  2. Francisco Rocha; Salvador Abreu; Correia, Miguel. The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud. IEEE Computer Society Press. 2013.
  3. Correia, Miguel; Paulo Sousa. Segurança no Software. FCA. 2010.

Outros

Outra produção
  1. Rocha, F.; Abreu, S.; Correia, M.. 2011. The final frontier: Confidentiality and privacy in the cloud. http://www.scopus.com/inward/record.url?eid=2-s2.0-80052864529&partnerID=MN8TOARS.
    10.1109/MC.2011.223
Atividades

Orientação

Título / Tema
Papel desempenhado
Curso (Tipo)
Instituição / Organização
2006/01 - Atual mais de 50 teses de mestrado
Coorientador
2016/09 - 2021/09 Mobile Security with Mixed-Trust Sensors
Coorientador
Universidade de Lisboa Instituto Superior Técnico, Portugal
2015/09 - 2021/09 Big Data Security Analytics
Orientador
Universidade de Lisboa Instituto Superior Técnico, Portugal
2015/09 - 2020/09 Machine Learning for Large-Scale Intrusion Detection
Orientador
Universidade de Lisboa Instituto Superior Técnico, Portugal
2019 - 2019 Intrusion Recovery in Cloud Computing
Coorientador
Engenharia Informática e de Computadores (Doutoramento)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2018 - 2018 PREMIUM: Private Reactive Multipath Communication Middleware
Coorientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2018 - 2018 Mobile Device Security with ARM TrustZone
Coorientador
Engenharia Informática e de Computadores (Doutoramento)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2012/11 - 2017/11 Dependable MapReduce in a Cloud-of-Clouds
Coorientador
Universidade de Lisboa Faculdade de Ciências, Portugal
2013/06 - 2017/06 Efficient and Secure Routing in Wireless Ad Hoc Networks
Coorientador
Universidade de Lisboa Instituto Superior Técnico, Portugal
2011/09 - 2016/09 Detection of Vulnerabilities and Automatic Protection for Web Applications
Coorientador
Universidade de Lisboa Faculdade de Ciências, Portugal
2016 - 2016 SafeAudit: A Software Library for Efficient Data Integrity Verification on Commercial Clouds
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2016 - 2016 vtTLS: A Vulnerability-Tolerant Communication Protocol
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2016 - 2016 MACHETE: Multi-path Communication for Security
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2016 - 2016 Security Testing in Continuous Integration Systems
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2016 - 2016 Fingerprinting for Web Applications: from Devices to Related Groups
Orientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2016 - 2016 DARSHANA: Detecting Route Hijacking For Communication Confidentiality
Coorientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2016 - 2016 Detection of Unknown Network Attackers Through Flow Analysis
Coorientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2015 - 2015 Automatic Diagnosis of Security Events in Complex Infrastructures using Logs
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2015 - 2015 Recovery from Security Intrusions in Cloud Computing
Orientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2015 - 2015 Segurança da Comunicação em Redes de Sensores em Malha
Coorientador
Engenharia de Redes de Comunicações (Mestrado)
Universidade de Lisboa Instituto Superior Técnico Campus Taguspark, Portugal
2014 - 2014 Framework para Detecção Automática de Vulnerabilidades em Aplicações Web usando Fuzzing
Orientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2014 - 2014 Authentication Security through Diversity and Redundancy for Cloud Computing
Orientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2013 - 2013 Connecting NFC to the Cloud - Remote Updating of Smart Cards
Coorientador
Engenharia Informática e de Computadores (Mestrado)
Universidade de Lisboa Instituto Superior Técnico, Portugal
2006/09 - 2010/12 Intrusion Tolerance in Large Scale Networks
Coorientador
Universidade de Lisboa Faculdade de Ciências, Portugal
2006/09 - 2010/11 Byzantine Fault-Tolerant Agreement Protocols for Wireless Ad hoc Networks
Coorientador
Universidade de Lisboa Faculdade de Ciências, Portugal
Distinções

Outra distinção

2017 Best student paper award
2017 Author with most papers accepted to IEEE NCA in the last two years
2015 Senior Member
IEEE, Estados Unidos
2011 Best Paper Award
2009 Best student paper award