User profiles for Italo Dacosta
Italo DacostaPost-doctoral researcher, EPFL Verified email at epfl.ch Cited by 1026 |
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
HTTP cookies are the de facto mechanism for session authentication in Web applications.
However, their inherent security weaknesses allow attacks against the integrity of Web …
However, their inherent security weaknesses allow attacks against the integrity of Web …
Smarper: Context-aware and automatic runtime-permissions for mobile devices
K Olejnik, I Dacosta, JS Machado… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Permission systems are the main defense that mobile platforms, such as Android and iOS,
offer to users to protect their private data from prying apps. However, due to the tension …
offer to users to protect their private data from prying apps. However, due to the tension …
Privateride: A privacy-enhanced ride-hailing service
In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs),
an on-line marketplace that enables accredited drivers to use their own cars to drive ride-…
an on-line marketplace that enables accredited drivers to use their own cars to drive ride-…
{ORide}: A {Privacy-Preserving} yet Accountable {Ride-Hailing} Service
In recent years, ride-hailing services (RHSs) have become increasingly popular, serving
millions of users per day. Such systems, however, raise significant privacy concerns, because …
millions of users per day. Such systems, however, raise significant privacy concerns, because …
Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties
The security guarantees provided by SSL/TLS depend on the correct authentication of
servers through certificates signed by a trusted authority. However, as recent incidents have …
servers through certificates signed by a trusted authority. However, as recent incidents have …
A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins
Location check-ins contain both geographical and semantic information about the visited
venues. Semantic information is usually represented by means of tags (eg, “restaurant”). Such …
venues. Semantic information is usually represented by means of tags (eg, “restaurant”). Such …
Consensual and privacy-preserving sharing of multi-subject and interdependent data
Individuals share increasing amounts of personal data online. This data often involves–or at
least has privacy implications for–data subjects other than the individuals who shares it (eg, …
least has privacy implications for–data subjects other than the individuals who shares it (eg, …
Securerun: Cheat-proof and private summaries for location-based activities
Activity-tracking applications, where people record and upload information about their
location-based activities (eg, the routes of their activities), are increasingly popular. Such …
location-based activities (eg, the routes of their activities), are increasingly popular. Such …
PriFi: Low-latency anonymity for organizational networks
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to
infer sensitive information from the network traffic - even if encryption is used. Typical …
infer sensitive information from the network traffic - even if encryption is used. Typical …
Robotic mobile fulfillment systems: A survey on recent developments and research opportunities
ÍR da Costa Barros, TP Nascimento - Robotics and Autonomous Systems, 2021 - Elsevier
With the advancement of the autonomous mobile robots applied to Warehouses and the
creation of the Robotic Mobile Fulfillment System after the market implementation of the Kiva …
creation of the Robotic Mobile Fulfillment System after the market implementation of the Kiva …