Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
About

About

Professor Manuel E. Correia got his MSc in foundations of advanced information processing technologies from the Imperial College of London in 1992 and his PhD in Computer Science from Oporto University in 2001. He is currently an Associate Professor at the Department of Computer Science of the Faculty of Science of Oporto University and a researcher in the field of computer security at the CRACS group of INESC TEC Porto where he is responsible for research projects related to anomaly detection and identity management and the security aspects of several industry contracts. He has also been a consultant for some Portuguese public agencies (Health and Education) in computer security. He co-founded a spin-off from the University, called HealthySystems that centers its activity in the area of information security with a strong focus on auditing, eID and anonymization techniques. In 2014 this spin-off won the National Pharmacies Association Prize for the pharmacy of the future with a project called DigitalPharma and more recently a CIO Summit Portugal award prize with a software solution developed to support clinical management and integration for large Hospitals.

Interest
Topics
Details

Details

  • Name

    Manuel Eduardo Correia
  • Role

    Senior Researcher
  • Since

    01st January 2009
005
Publications

2023

Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication

Authors
Freitas, T; Soares, J; Correia, ME; Martins, R;

Publication
COMPUTERS & SECURITY

Abstract
Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct system/application behavior even in the presence of arbitrary faults (i.e., Byzantine faults). Byzantine Fault tolerant State Machine Replication (BFT-SMR) is a known software solution for masking arbitrary faults and malicious attacks (Liu et al., 2020). In this survey, we present and discuss relevant BFT-SMR protocols, focusing on deterministic and probabilistic approaches. The main purpose of this paper is to discuss the characteristics of proposed works for each approach, as well as identify the trade-offs for each different approach.& COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )

2023

SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification Framework

Authors
Shehu, AS; Pinto, A; Correia, ME;

Publication
International Conference on Smart Applications, Communications and Networking, SmartNets 2023, Istanbul, Turkey, July 25-27, 2023

Abstract
Traditional identity management (IdM) systems rely on third-party identity providers (IdPs) and are centralised, which can make them vulnerable to data breaches and other security risks. Self-sovereign identity (SSI) is a newer IdM model that allows users to control their own identities by using decentralised technologies like blockchain to store and verify them. However, SSI systems have their own security concerns, such as digital wallet vulnerabilities, blockchain threats and conflicts with general data protection regulation (GDPR). Additionally, the lack of incentives for issuers, verifiers and data owners could limit its acceptance. This paper proposes SPIDVerify, which is a decentralised identity verification framework that utilises an SSI-based architecture to address these issues. The framework uses a mixed method for acquiring a W3C standard verified credentials and to ensure that only a thoroughly verified entity acquires verified credential, and employs secure key cryptographic protocols; Diffie-Hellman (DH) and Extended Triple Diffie-Hellman (X3DH) for forward secrecy secure communication, single-use challenge-response for authentication, and Swarm network for decentralised storage of data. These methods enhance the security of the proposed framework with better resilience against impersonation and credential stealing. To evaluate the proposal, we have outlined the limitations in related works and demonstrated two scenarios to showcase the strength and effectiveness of SPIDVerify in dealing with the threats identified. We have also tested the methods used in SPIDVerify by measuring the time taken to execute certain processes. © 2023 IEEE.

2023

Skynet: a Cyber-Aware Intrusion Tolerant Overseer

Authors
Freitas, T; Soares, J; Correia, ME; Martins, R;

Publication
2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S

Abstract
The increasing level of sophistication of cyber attacks which are employing cross-cutting strategies that leverage multi-domain attack surfaces, including but not limited to, software defined networking poisoning, biasing of machine learning models to suppress detection, exploiting software (development), and leveraging system design deficiencies. While current defensive solutions exist, they only partially address multi-domain and multi-stage attacks, thus rendering them ineffective to counter the upcoming generation of attacks. More specifically, we argue that a disruption is needed to approach separated knowledge domains, namely Intrusion Tolerant systems, cybersecurity, and machine learning. We argue that current solutions tend to address different concerns/facets of overlapping issues and they tend to make strong assumptions of supporting infrastructure, e.g., assuming that event probes/metrics are not compromised. To address these issues, we present Skynet, a platform that acts as a secure overseer that merges traditional roles of SIEMs with conventional orchestrators while being rooted on the fundamentals introduced by previous generations of intrusion tolerant systems. Our goal is to provide an open-source intrusion tolerant platform that can dynamically adapt to known and unknown security threats in order to reduce potential vulnerability windows.

2023

HAL 9000: Skynet's Risk Manager

Authors
Freitas, T; Serra Neto, MTR; Dutra, I; Soares, J; Correia, ME; Martins, R;

Publication
CoRR

Abstract

2022

Digital Forensics for the Detection of Deepfake Image Manipulations

Authors
Ferreira, S; Antunes, M; Correia, ME;

Publication
ERCIM NEWS

Abstract
Tampered multimedia content is increasingly being used in a broad range of cybercrime activities. The spread of fake news, misinformation, digital kidnapping, and ransomware-related crimes are among the most recurrent crimes in which manipulated digital photos are being used as an attacking vector. One of the linchpins of accurately detecting manipulated multimedia content is the use of machine learning and deep learning algorithms. This work proposed a dataset of photos and videos suitable for digital forensics, which has been used to benchmark Support Vector Machines (SVM) and Convolution Neural Networks algorithms (CNN). An SVM-based module for the Autopsy digital forensics open-source application has also been developed. This was evaluated as a very capable and useful forensic tool, winning second place on the OSDFCon international Autopsy modules competition.

Supervised
thesis

2023

Deepfake Generation for use in Dictionary Attacks on Facial Recognition Systems

Author
Vasco Mucha Barros

Institution
UP-FCUP

2023

Establishing Secure and Privacy Preserving Digital Identity With Self-Sovereign Identity

Author
Muhammad Shehu Abubakar-Sadiq

Institution
UP-FCUP

2023

SkyNet: Towards a Dynamic and Adaptive Intrusion Tolerant System

Author
Tadeu Augusto Leite Freitas

Institution
UP-FCUP

2023

SSI Technology in the context of eIDAS 2.0

Author
João Manuel Alexandrino de Castro Ribeiro

Institution
UP-FCUP

2022

Infrastructure for Identity Management, Authentication and Authorization

Author
Muhammad Shehu Abubakar-Sadiq

Institution
UP-FCUP