Skip to main content

Showing 1–6 of 6 results for author: Veronese, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2201.01649  [pdf, other

    cs.CR

    WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms

    Authors: Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo Maffei

    Abstract: The complexity of browsers has steadily increased over the years, driven by the continuous introduction and update of Web platform components, such as novel Web APIs and security mechanisms. Their specifications are manually reviewed by experts to identify potential security issues. However, this process has proved to be error-prone due to the extensiveness of modern browser specifications and the… ▽ More

    Submitted 1 September, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: Submitted to IEEE S&P '23 on 19 Aug 2022

  2. Bulwark: Holistic and Verified Security Monitoring of Web Protocols

    Authors: Lorenzo Veronese, Stefano Calzavara, Luca Compagna

    Abstract: Modern web applications often rely on third-party services to provide their functionality to users. The secure integration of these services is a non-trivial task, as shown by the large number of attacks against Single Sign On and Cashier-as-a-Service protocols. In this paper we present Bulwark, a new automatic tool which generates formally verified security monitors from applied pi-calculus speci… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: Full version of the paper presented at ESORICS2020 (14-18 September 2020)

    Journal ref: ESORICS 2020: Computer Security (2020) 23-41

  3. arXiv:2012.01946  [pdf, other

    cs.CR

    Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web

    Authors: Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei

    Abstract: Related-domain attackers control a sibling domain of their target web application, e.g., as the result of a subdomain takeover. Despite their additional power over traditional web attackers, related-domain attackers received only limited attention by the research community. In this paper we define and quantify for the first time the threats that related-domain attackers pose to web application sec… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: Submitted to USENIX Security '21 on 16 Oct 2020

  4. arXiv:1901.04407  [pdf, other

    cs.RO

    Self-Driving Cars: A Survey

    Authors: Claudine Badue, Rânik Guidolini, Raphael Vivacqua Carneiro, Pedro Azevedo, Vinicius Brito Cardoso, Avelino Forechi, Luan Jesus, Rodrigo Berriel, Thiago Paixão, Filipe Mutz, Lucas Veronese, Thiago Oliveira-Santos, Alberto Ferreira De Souza

    Abstract: We survey research on self-driving cars published in the literature focusing on autonomous cars developed since the DARPA challenges, which are equipped with an autonomy system that can be categorized as SAE level 3 or higher. The architecture of the autonomy system of self-driving cars is typically organized into the perception system and the decision-making system. The perception system is gener… ▽ More

    Submitted 2 October, 2019; v1 submitted 14 January, 2019; originally announced January 2019.

  5. arXiv:1810.02355  [pdf

    cs.AI cs.RO

    Memory-like Map Decay for Autonomous Vehicles based on Grid Maps

    Authors: Thomas Teixeira, Filipe Mutz, Karin Satie Komati, Lucas Veronese, Vinicius B. Cardoso, Claudine Badue, Thiago Oliveira-Santos, Alberto F. De Souza

    Abstract: In this work, we present a novel strategy for correcting imperfections in occupancy grid maps called map decay. The objective of map decay is to correct invalid occupancy probabilities of map cells that are unobservable by sensors. The strategy was inspired by an analogy between the memory architecture believed to exist in the human brain and the maps maintained by an autonomous vehicle. It consis… ▽ More

    Submitted 27 April, 2021; v1 submitted 4 October, 2018; originally announced October 2018.

    Comments: This is a preprint. Published in American journal of Engineering Research (AJER) Available at http://www.ajer.org/papers/Vol-9-issue-9/J09096371.pdf

    ACM Class: I.2.9

    Journal ref: American Journal of Engineering Research (AJER), vol. 9(9), 2020, pp. 63-71

  6. A Model-Predictive Motion Planner for the IARA Autonomous Car

    Authors: Vinicius Cardoso, Josias Oliveira, Thomas Teixeira, Claudine Badue, Filipe Mutz, Thiago Oliveira-Santos, Lucas Veronese, Alberto F. De Souza

    Abstract: We present the Model-Predictive Motion Planner (MPMP) of the Intelligent Autonomous Robotic Automobile (IARA). IARA is a fully autonomous car that uses a path planner to compute a path from its current position to the desired destination. Using this path, the current position, a goal in the path and a map, IARA's MPMP is able to compute smooth trajectories from its current position to the goal in… ▽ More

    Submitted 9 November, 2017; v1 submitted 14 November, 2016; originally announced November 2016.

    Comments: This is a preprint. Accepted by 2017 IEEE International Conference on Robotics and Automation (ICRA)

    ACM Class: I.2.9

    Journal ref: IEEE International Conference on Robotics and Automation (ICRA 2017), 2017, pp. 225-230