Nuno Neves

2017
Nunes, P., I. Medeiros, J. Fonseca, N. Neves, M. Correia, and M. Vieira, "On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study", 2017 13th European Dependable Computing Conference (EDCC): IEEE, pp. 121–128, 2017.
Medeiros, I., M. Beatriz, N. Neves, and M. Correia, "Demonstrating a Tool for Injection Attack Prevention in MySQL", Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on: IEEE, pp. 551–558, 2017.
Alaluna, M., E. Vial, N. Neves, and F. M. V. Ramos, "Secure and Dependable Multi-Cloud Network Virtualization", Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures: ACM, pp. 2, 2017.
Pereira, F., N. Ferreira Neves, and F. M. V. Ramos, "Secure Network Monitoring Using Programmable Data Planes", Third International Workshop on Security in NFV-SDN (IEEE NFV-SDN 2017), 2017.
Vavala, B., N. Neves, and P. Steenkiste, "Secure tera-scale data crunching with a small TCB", Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on: IEEE, pp. 169–180, 2017.
Alaluna, M., L. Ferrolho, J. Rui Figueira, N. Neves, and F. Ramos, "Secure Virtual Network Embedding in a Multi-Cloud Environment", arXiv preprint arXiv:1703.01313, 2017.
2016
Medeiros, I., N. Neves, and M. Correia, "DEKANT: a static analysis tool that learns to detect web application vulnerabilities", Proceedings of the 25th International Symposium on Software Testing and Analysis: ACM, pp. 1–11, 2016.
Medeiros, I., N. Neves, and M. Correia, "Detecting and removing web application vulnerabilities with static analysis and data mining", IEEE Transactions on Reliability, vol. 65, no. 1: IEEE, pp. 54–69, 2016.
Medeiros, I., N. Neves, and M. Correia, "Equipping WAP with weapons to detect vulnerabilities", Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016.
Medeiros, I., N. Neves, and M. Correia, "Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report", Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on: IEEE, pp. 630–637, 2016.
Medeiros, I., M. Beatriz, N. Neves, and M. Correia, "Hacking the DBMS to Prevent Injection Attacks", Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy: ACM, pp. 295–306, 2016.
Bessani, A., N. F. Neves, P. Veríssimo, W. Dantas, A. Fonseca, R. Silva, P. Luz, and M. Correia, "JITeR: Just-in-time application-layer routing", Computer Networks, vol. 104: Elsevier, pp. 122–136, 2016.
Alaluna, M., F. M. V. Ramos, and N. Neves, "(Literally) Above the clouds: Virtualizing the network over multiple clouds", NetSoft Conference and Workshops (NetSoft), 2016 IEEE: IEEE, pp. 112–115, 2016.
Ferrolho, L., M. Alaluna, N. Neves, and F. Ramos, "Secure and dependable virtual network embedding", arXiv preprint arXiv:1602.02268, 2016.
Vavala, B., N. Neves, and P. Steenkiste, "Secure Identification of Actively Executed Code on a Generic Trusted Component", Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on: IEEE, pp. 419–430, 2016.
Garcia, M., N. Neves, and A. Bessani, "Sieveq: A layered bft protection system for critical services", IEEE Transactions on Dependable and Secure Computing: IEEE, 2016.
Lacoste, M., M. Miettinen, N. Neves, F. M. V. Ramos, M. Vukolić, F. Charmet, R. Yaich, K. Oborzynski, G. Vernekar, and P. Sousa, "User-Centric Security and Dependability in the Clouds-of-Clouds", IEEE Cloud Computing, vol. 3, no. 5: IEEE, pp. 64–75, 2016.
2015
Onica, R., N. Ferreira Neves, and A. Casimiro, "Fault-Tolerant Precision Time Protocol for Smart Grids", Proceedings of the 7th Simposio de Informatica (INFORUM), Covilha, Portugal, 2015.
Vavala, B., N. Ferreira Neves, and P. Steenkiste, "Securing Passive Replication Through Verification", Proceedings of the 34th Symposium on Reliable Distributed Systems (SRDS), Montreal, Canada, 2015.
2014
Garcia, M., A. Neves Bessani, I. Gashi, N. Ferreira Neves, and R. Obelheiro, "Analysis of operating system diversity for intrusion tolerance", Software: Practice and Experience, vol. 44, no. 6, pp. 735–770, 2014.
Medeiros, I., N. Ferreira Neves, and M. Correia, "Automatic detection and correction of web application vulnerabilities using data mining to predict false positives", Proceedings of the 23rd international conference on World wide web: International World Wide Web Conferences Steering Committee, pp. 63–74, 2014.
Bessani, A. Neves, M. Correia, and N. Neves, Consistency Anchor Formalization and Correctness Proofs, : Technical Report DI-FCUL-2014-02, ULisboa, 2014.
Bessani, A. Neves, R. Mendes, T. Oliveira, N. Ferreira Neves, M. Correia, M. Pasin, and P. Verissimo, "SCFS: a shared cloud-backed file system", Usenix ATC, 2014.
Lopes, J., and N. Ferreira Neves, "Stopping a Rapid Tornado with a Puff", Security and Privacy (SP), 2014 IEEE Symposium on: IEEE, pp. 509–523, 2014.
2013
Moniz, H., N. Ferreira Neves, and M. Correia, "Byzantine fault-tolerant consensus in wireless ad hoc networks", Mobile Computing, IEEE Transactions on, vol. 12, no. 12: IEEE, pp. 2441–2454, 2013.
Bessani, A. Neves, M. Santos, J. Felix, N. Ferreira Neves, and M. Correia, "On the Efficiency of Durable State Machine Replication.", USENIX Annual Technical Conference, pp. 169–180, 2013.
Mendonca, M., and N. Ferreira Neves, "Intercept: Profiling Windows Network Device Drivers", Dependable Computing: Springer Berlin Heidelberg, pp. 61–75, 2013.
Garcia, M., N. Ferreira Neves, and A. Neves Bessani, "An intrusion-tolerant firewall design for protecting SIEM systems", 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W): IEEE, pp. 1–7, 2013.
Carvalho, T., H. S. Kim, and N. Ferreira Neves, "PACE your network: Fair and controllable multi-tenant data center networks", Communications (ICC), 2013 IEEE International Conference on: IEEE, pp. 3726–3731, 2013.
Lopes, J., and N. Ferreira Neves, "Robustness of the RaptorQ FEC Code Under Malicious Attacks", Inforum, 2013.
Medeiros, I., N. Ferreira Neves, and M. Correia, "Securing energy metering software with automatic source code correction", Industrial Informatics (INDIN), 2013 11th IEEE International Conference on: IEEE, pp. 701–706, 2013.
2012
Correia, M., N. Ferreira Neves, and P. Verissimo, "BFT-TO: Intrusion tolerance with less replicas", The Computer Journal: Oxford University Press, pp. bxs148, 2012.
Garcia, M., N. Ferreira Neves, and A. Neves Bessani, "Diversys: Diverse rejuvenation system", Proceedings of the INFORUM-Simpósio de Informática, 2012.
Vavala, B., and N. Ferreira Neves, "LaSIGE, Univ. of Lisbon, Lisbon, Portugal", Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on: IEEE, pp. 161–170, 2012.
Antunes, J., and N. Ferreira Neves, "Recycling test cases to detect security vulnerabilities", Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on: IEEE, pp. 231–240, 2012.
Vavala, B., and N. Ferreira Neves, "Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions.", SRDS, pp. 161–170, 2012.
2011
Bessani, A. Neves, N. Ferreira Neves, A. Casimiro, C. Arce, E. Prieto, G. Gonzalez Granadillo, J. Repp, M. Zhdanova SIT, O. Polubelova, E. Novikova SPIIRAS, et al., Architecture Document, , 2011.
Antunes, J., and N. Ferreira Neves, "Automatically complementing protocol specifications from network traces", Proceedings of the 13th European Workshop on Dependable Computing: ACM, pp. 87–92, 2011.
Correia, M., G. Santos Veronese, N. Ferreira Neves, and P. Verissimo, "Byzantine consensus in asynchronous message-passing systems: a survey", International Journal of Critical Computer-Based Systems, vol. 2, no. 2: Inderscience Publishers, pp. 141–161, 2011.
Elia, I. Alessandro, V. Formicola, L. Romano, S. D'Antonio, N. Ferreira Neves, R. Rieke, J. Blasco Bermejo, and A. Román, D2. 1.1–Scenario Requirements (Public version), , 2011.
Antunes, J., and N. Ferreira Neves, "Diveinto: Supporting diversity in intrusion-tolerant systems", Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on: IEEE, pp. 137–146, 2011.
Garcia, M., A. Neves Bessani, and N. Ferreira Neves, "Diverse OS Rejuvenation for Intrusion Tolerance", Supplement of the International Conference on Dependable Systems and Networks (DSN), 2011.
Garcia, M., A. Neves Bessani, I. Gashi, N. Ferreira Neves, and R. Obelheiro, "OS diversity for intrusion tolerance: Myth or reality?", Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on: IEEE, pp. 383–394, 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Randomization can be a healer: consensus with dynamic omission failures", Distributed Computing, vol. 24, no. 3-4: Springer-Verlag, pp. 165–175, 2011.
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized Consensus in Wireless Environments", International Journal On Advances in Intelligent Systems, vol. 4, no. 1 and 2, pp. 1–12, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Reverse engineering of protocols from network traces", Reverse Engineering (WCRE), 2011 18th Working Conference on: IEEE, pp. 169–178, 2011.
Antunes, J., N. Ferreira Neves, and P. Verissimo, ReverX: Reverse engineering of protocols, , 2011.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "RITAS: Services for randomized intrusion tolerance", Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1: IEEE, pp. 122–136, 2011.
Antunes, J., and N. Ferreira Neves, "Using behavioral profiles to detect software flaws in network servers", Software Reliability Engineering (ISSRE), 2011 IEEE 22nd International Symposium on: IEEE, pp. 1–10, 2011.
2010
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery", Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 4: IEEE, pp. 452–465, 2010.
Vavala, B., N. Ferreira Neves, H. Moniz, and P. Verissimo, "Randomized consensus in wireless environments: a case where more is better", Dependability (DEPEND), 2010 Third International Conference on: IEEE, pp. 7–12, 2010.
Moniz, H., N. Ferreira Neves, and M. Correia, "Turquois: Byzantine consensus in wireless ad hoc networks", Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on: IEEE, pp. 537–546, 2010.
Moniz, H., N. Ferreira Neves, and M. Correia, Turquois: Byzantine Consensus in Wireless Ad hoc Networks (extended version), , 2010.
Antunes, J., N. Ferreira Neves, M. Correia, P. Verissimo, and R. Neves, "Vulnerability discovery with attack injection", Software Engineering, IEEE Transactions on, vol. 36, no. 3: IEEE, pp. 357–370, 2010.
2009
Antunes, J., and N. Ferreira Neves, "Building an automation towards reverse protocol engineering", 2012-10-10]. http://homepages. di. fc. ul. pt/\~{} nuno/PAPERS/INFORUM09. pdf, 2009.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, "Cheap intrusion-tolerant protection for crutial things", Technical Report DI-FCUL TR-2009-14, 2009.
Correia, M., A. Neves Bessani, N. Ferreira Neves, P. Verissimo, and P. Sousa, Cheap Intrusion-Tolerant Protection for CRUTIAL Things, , 2009.
Verissimo, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Sousa, "Designing modular and redundant cyber architectures for process control: Lessons learned", System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on: IEEE, pp. 1–8, 2009.
Moniz, H., A. Tedeschi, N. Ferreira Neves, and M. Correia, "A distributed systems approach to airborne self-separation", Computational Models, Software Engineering, and Advanced Technologies in Air Transportation: Next Generation Applications: Next Generation Applications: IGI Global, pp. 215, 2009.
Franceschinis, G., E. Alata, J. Antunes, H. Beitollah, A. Neves Bessani, M. Correia, W. Dantas, G. Deconinck, M. Kaaniche, N. Ferreira Neves, et al., Experimental validation of architectural solutions, , 2009.
Franceschinis, G., E. Alata, J. Antunes, H. Beitollah, A. Neves Bessani, M. Correia, W. Dantas, G. Deconinck, M. Kaaniche, N. Ferreira Neves, et al., Experimental validation of architectural solutions (II), , 2009.
Verissimo, P., M. Correia, N. Ferreira Neves, and P. Sousa, "Intrusion-resilient middleware design and validation", Information Assurance, Security and Privacy Services, vol. 4, pp. 615–678, 2009.
Sousa, P., A. Neves Bessani, W. S. Dantas, F. Souto, M. Correia, and N. Ferreira Neves, "Intrusion-tolerant self-healing devices for critical infrastructure protection", Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on: IEEE, pp. 217–222, 2009.
Sousa, P., A. Neves Bessani, W. S. Dantas, F. Souto, M. Correia, and N. Ferreira Neves, Intrusion-Tolerant Self-Healing Devices fror Critical Infrastructure Protection, : 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009), 2009.
2008
Correia, M., A. Neves Bessani, P. Sousa, N. Ferreira Neves, and P. Verissimo, Critical Infrastructure Protection: the CRUTIAL Project, , 2008.
Verissimo, P., N. Ferreira Neves, M. Correia, Y. Deswarte, A. Abou El Kalan, A. Bondavalli, and A. Daidone, "The CRUTIAL architecture for critical information infrastructures", Architecting Dependable Systems V: Springer Berlin Heidelberg, pp. 1–27, 2008.
Verissimo, P., N. Ferreira Neves, M. Correia, Y. Deswarte, A. Abou El Kalan, A. Bondavalli, and A. Daidone, The CRUTIAL Architecture for Critical Information Infrastructures, Architecting Dependable Systems V, : Springer-Verlag, Berlin, Heidelberg, 2008.
Verissimo, P., N. Ferreira Neves, and M. Correia, "The CRUTIAL reference critical information infrastructure architecture: a blueprint", International Journal of System of Systems Engineering, vol. 1, no. 1: Inderscience, pp. 78–95, 2008.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, "The CRUTIAL way of critical infrastructure protection", Security & Privacy, IEEE, vol. 6, no. 6: IEEE, pp. 44–51, 2008.
Antunes, J., N. Ferreira Neves, and P. Verissimo, "Detection and prediction of resource-exhaustion vulnerabilities", Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on: IEEE, pp. 87–96, 2008.
Donatelli, S., E. Alata, J. Antunes, M. Kaaniche, N. Ferreira Neves, and P. Verissimo, Experimental validation of architectural solutions, : Department of Informatics, University of Lisbon, 2008.
Donatelli, S., E. Alata, J. Antunes, M. Kaaniche, N. Ferreira Neves, and P. Verissimo, Experimental validation of architectural solutions (I), : Department of Informatics, University of Lisbon, 2008.
Mendonca, M., and N. Ferreira Neves, "Fuzzing wi-fi drivers to locate security vulnerabilities", Dependable Computing Conference, 2008. EDCC 2008. Seventh European: IEEE, pp. 110–119, 2008.
Neves, N. Ferreira, and P. Verissimo, Preliminary specification of services and protocols, : Department of Informatics, University of Lisbon, 2008.
2007
Teixeira, E., J. Antunes, and N. Ferreira Neves, "Avaliação de Ferramentas de Análise Estática de Código para Detecção de Vulnerabilidades", Actas da 3ª Conferência Nacional Sobre Segurança Informática nas Organizações, Lisboa, Portugal, 2007.
Antunes, J., N. Ferreira Neves, and P. Verissimo, Finding Local Resource Exhaustion Vulnerabilities, : International Symposium on Software Reliability Engineering, 2007.
Sousa, P., N. Ferreira Neves, and P. Verissimo, "Hidden problems of asynchronous proactive recovery", Proceedings of the Workshop on Hot Topics in System Dependability, 2007.
Moniz, H., N. Ferreira Neves, M. Correia, A. Casimiro, and P. Verissimo, "Intrusion tolerance in wireless environments: An experimental evaluation", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 357–364, 2007.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Intrusion-tolerant protection for critical infrastructures, : Department of Informatics, University of Lisbon, 2007.
Mendonca, M., and N. Ferreira Neves, "Localização de Vulnerabilidades de Segurança em Gestores de Dispositivos Wi-Fi com Técnicas de Fuzzing", Actas da 3ª Conferência Nacional Sobre Segurança Informática nas Organizações, Lisboa, Portugal, 2007.
Correia, M., and N. Ferreira Neves, Proceedings of the First Workshop on Recent Advances on Intrusion-Tolerant Systems, : Department of Informatics, University of Lisbon, 2007.
Bessani, A. Neves, P. Sousa, M. Correia, N. Ferreira Neves, and P. Verissimo, Protecting CRUTIAL Things, : 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007.
Strigini, L., N. Ferreira Neves, M. Raynal, M. Harrison, M. Kaaniche, F. Von Henke, and , Resilience-building technologies: State of knowledge, , 2007.
Strigini, L., N. Ferreira Neves, M. Raynal, M. Harrison, M. Kaaniche, and F. Von Henke, Resilience-Building Technologies: State of Knowledge–ReSIST NoE Deliverable D12, : Department of Informatics, University of Lisbon, 2007.
Sousa, P., A. Neves Bessani, M. Correia, N. Ferreira Neves, and P. Verissimo, "Resilient intrusion tolerance through proactive and reactive recovery", Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on: IEEE, pp. 373–380, 2007.
Mendonca, M., and N. Ferreira Neves, "Robustness testing of the Windows DDK", Dependable Systems and Networks, 2007. DSN'07. 37th Annual IEEE/IFIP International Conference on: IEEE, pp. 554–564, 2007.
Bessani, A. Neves, M. Correia, H. Moniz, N. Ferreira Neves, and P. Verissimo, "When 3 f+ 1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus", Brief Announcement, Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Lemesos, Cyprus: Springer Berlin/Heidelberg, pp. 480–481, 2007.
Correia, M., N. Ferreira Neves, C. L Lung, and P. Verissimo, "Worm-IT–a wormhole-based intrusion-tolerant group communication system", Journal of Systems and Software, vol. 80, no. 2: Elsevier, pp. 178–197, 2007.
2006
Verissimo, P., N. Ferreira Neves, and M. Correia, "CRUTIAL: The blueprint of a reference critical information infrastructure architecture", Critical Information Infrastructures Security: Springer Berlin Heidelberg, pp. 1–14, 2006.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Experimental comparison of local and shared coin randomized consensus protocols", Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on: IEEE, pp. 235–244, 2006.
Correia, M., N. Ferreira Neves, and P. Verissimo, "From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures", The Computer Journal, vol. 49, no. 1: Br Computer Soc, pp. 82–96, 2006.
Verissimo, P., N. Ferreira Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch, "Intrusion-tolerant middleware: The road to automatic security", Security & Privacy, IEEE, vol. 4, no. 4: IEEE, pp. 54–62, 2006.
Neves, N. Ferreira, "Locating file processing vulnerabilities", Fast abstract in Supplement of the Int. Conf. on Dependable Systems and Networks, 2006.
Sousa, P., N. Ferreira Neves, P. Verissimo, and W. H. Sanders, "Proactive resilience revisited: The delicate balance between resisting intrusions and remaining available", Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on: IEEE, pp. 71–82, 2006.
Sousa, P., N. Ferreira Neves, and P. Verissimo, "Proactive resilience through architectural hybridization", Proceedings of the 2006 ACM symposium on Applied computing: ACM, pp. 686–690, 2006.
Moniz, H., N. Ferreira Neves, M. Correia, and P. Verissimo, "Randomized intrusion-tolerant asynchronous services", Dependable Systems and Networks, 2006. DSN 2006. International Conference on: IEEE, pp. 568–577, 2006.
Sousa, P., N. Ferreira Neves, A. Lopes, and P. Verissimo, "On the resilience of intrusion-tolerant distributed systems", DI/FCUL TR 06–14, DEP. OF INFORMATICS, UNIV. OF LISBON, SEPTEMBER 2006.–PRELIMINARY ARCHITECTURE SPECIFICATION PAGE 100, 2006.
Neves, N. Ferreira, P. Verissimo, P. Sousa, and A. Lopes, On the Resilience of Intrusion-Tolerant Distributed Systems, : Department of Informatics, University of Lisbon, 2006.
Neves, N. Ferreira, J. Antunes, M. Correia, P. Verissimo, and R. Neves, "Using attack injection to discover new vulnerabilities", Dependable Systems and Networks, 2006. DSN 2006. International Conference on: IEEE, pp. 457–466, 2006.

Pages