Miguel Castro
Miguel Castro
Distinguished Engineer, Microsoft Research
Verified email at
Cited by
Cited by
Practical byzantine fault tolerance
M Castro, B Liskov
OsDI 99 (1999), 173-186, 1999
Practical byzantine fault tolerance and proactive recovery
M Castro, B Liskov
ACM Transactions on Computer Systems (TOCS) 20 (4), 398-461, 2002
SCRIBE: A large-scale and decentralized application-level multicast infrastructure
M Castro, P Druschel, AM Kermarrec, AIT Rowstron
IEEE Journal on Selected Areas in communications 20 (8), 1489-1499, 2002
Splitstream: High-bandwidth multicast in cooperative environments
M Castro, P Druschel, AM Kermarrec, A Nandi, A Rowstron, A Singh
ACM SIGOPS operating systems review 37 (5), 298-313, 2003
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
A Adya, WJ Bolosky, M Castro, G Cermak, R Chaiken, JR Douceur, ...
ACM SIGOPS Operating Systems Review 36 (SI), 1-14, 2002
Secure routing for structured peer-to-peer overlay networks
M Castro, P Druschel, A Ganesh, A Rowstron, DS Wallach
ACM SIGOPS Operating Systems Review 36 (SI), 299-314, 2002
{FaRM}: Fast remote memory
A Dragojević, D Narayanan, M Castro, O Hodson
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
Vigilante: End-to-end containment of internet worms
M Costa, J Crowcroft, M Castro, A Rowstron, L Zhou, L Zhang, P Barham
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
SCRIBE: The design of a large-scale event notification infrastructure
A Rowstron, AM Kermarrec, M Castro, P Druschel
Networked Group Communication: Third International COST264 Workshop, NGC …, 2001
Virtual ring routing: network routing inspired by DHTs
M Caesar, M Castro, EB Nightingale, G O'Shea, A Rowstron
ACM SIGCOMM computer communication review 36 (4), 351-362, 2006
Securing software by enforcing data-flow integrity.
M Castro, M Costa, T Harris
OSDI 6, 147-160, 2006
PIC: Practical Internet coordinates for distance estimation
M Costa, M Castro, R Rowstron, P Key
24th International Conference on Distributed Computing Systems, 2004 …, 2004
Preventing memory error exploits with WIT
P Akritidis, C Cadar, C Raiciu, M Costa, M Castro
2008 IEEE Symposium on Security and Privacy (sp 2008), 263-277, 2008
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
P Akritidis, M Costa, M Castro, S Hand
USENIX Security Symposium 10, 96, 2009
An evaluation of scalable application-level multicast built using peer-to-peer overlays
M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ...
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
Containment of worms
M Costa, M Castro, A Rowstron, J Crowcroft
US Patent 7,603,715, 2009
No compromises: distributed transactions with consistency, availability, and performance
A Dragojević, D Narayanan, EB Nightingale, M Renzelmann, A Shamis, ...
Proceedings of the 25th symposium on operating systems principles, 54-70, 2015
Exploiting network proximity in peer-to-peer overlay networks
M Castro, P Druschel, YC Hu, A Rowstron
Technical Report MSR-TR-2002-82, Microsoft Research 22, 23-24, 2002
Proactive Recovery in a {Byzantine-Fault-Tolerant} System
M Castro, B Liskov
Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000), 2000
Topology-aware routing in structured peer-to-peer overlay networks
M Castro, P Druschel, YC Hu, A Rowstron
Future Directions in Distributed Computing: Research and Position Papers …, 2003
The system can't perform the operation now. Try again later.
Articles 1–20