User profiles for Italo Dacosta

Italo Dacosta

Post-doctoral researcher, EPFL
Verified email at epfl.ch
Cited by 1026

One-time cookies: Preventing session hijacking attacks with stateless authentication tokens

I Dacosta, S Chakradeo, M Ahamad… - ACM Transactions on …, 2012 - dl.acm.org
HTTP cookies are the de facto mechanism for session authentication in Web applications.
However, their inherent security weaknesses allow attacks against the integrity of Web …

Smarper: Context-aware and automatic runtime-permissions for mobile devices

K Olejnik, I Dacosta, JS Machado… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Permission systems are the main defense that mobile platforms, such as Android and iOS,
offer to users to protect their private data from prying apps. However, due to the tension …

Privateride: A privacy-enhanced ride-hailing service

A Pham, I Dacosta, B Jacot-Guillarmod… - … on Privacy Enhancing …, 2017 - serval.unil.ch
In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs),
an on-line marketplace that enables accredited drivers to use their own cars to drive ride-…

{ORide}: A {Privacy-Preserving} yet Accountable {Ride-Hailing} Service

A Pham, I Dacosta, G Endignoux… - 26th USENIX Security …, 2017 - usenix.org
In recent years, ride-hailing services (RHSs) have become increasingly popular, serving
millions of users per day. Such systems, however, raise significant privacy concerns, because …

Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties

I Dacosta, M Ahamad, P Traynor - European symposium on research in …, 2012 - Springer
The security guarantees provided by SSL/TLS depend on the correct authentication of
servers through certificates signed by a trusted authority. However, as recent incidents have …

A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins

…, S Mihaila, R Shokri, I Dacosta… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Location check-ins contain both geographical and semantic information about the visited
venues. Semantic information is usually represented by means of tags (eg, “restaurant”). Such …

Consensual and privacy-preserving sharing of multi-subject and interdependent data

AM Olteanu, K Huguenin, I Dacosta… - Proceedings of the 25th …, 2018 - serval.unil.ch
Individuals share increasing amounts of personal data online. This data often involves–or at
least has privacy implications for–data subjects other than the individuals who shares it (eg, …

Securerun: Cheat-proof and private summaries for location-based activities

…, K Huguenin, I Bilogrevic, I Dacosta… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Activity-tracking applications, where people record and upload information about their
location-based activities (eg, the routes of their activities), are increasingly popular. Such …

PriFi: Low-latency anonymity for organizational networks

L Barman, I Dacosta, M Zamani, E Zhai… - arXiv preprint arXiv …, 2017 - arxiv.org
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to
infer sensitive information from the network traffic - even if encryption is used. Typical …

Robotic mobile fulfillment systems: A survey on recent developments and research opportunities

ÍR da Costa Barros, TP Nascimento - Robotics and Autonomous Systems, 2021 - Elsevier
With the advancement of the autonomous mobile robots applied to Warehouses and the
creation of the Robotic Mobile Fulfillment System after the market implementation of the Kiva …