Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2026

Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors

Authors
Afonso Vilalonga; Kevin Gallagher; João S. Resende; Henrique Domingos;

Publication
Proceedings on Privacy Enhancing Technologies

Abstract
Recent research on online censorship has provided valuable insights into common censorship strategies and censors' tolerance for collateral damage. A consistent finding across these studies is that censors tend to favour cost-effective techniques such as proxy enumeration, active probing, and deep packet inspection (DPI), rather than more complex and non-deterministic methods such as deep learning-based traffic analysis. For example, a recent study on the Snowflake censorship evasion system reinforced this finding by demonstrating that authoritarian regimes primarily relied on DPI to target the system. However, as censorship techniques continue to evolve, two critical questions arise: (1) What future attack vectors are likely to emerge based on current research and observed censor capabilities? (2) How can these emerging threats, along with previously utilised censorship methods, be effectively mitigated? In this paper, we present Obscura, a censorship evasion system designed to resist cost-effective, historically grounded censorship techniques while also defending against a class of plausible future attacks within a cost-effective threat model targeting WebRTC-based censorship evasion systems. Obscura is built upon four core features: (1) encapsulation of traffic within WebRTC media streams, (2) the use of a reliability layer, (3) support for both browser-based and Pion-based clients and proxy instances, and (4) the use of ephemeral proxies. Each feature is intended to mitigate either a known attack observed in the wild or a theoretically plausible attack consistent with the capabilities of a cost-effective censor. We provide a security analysis to justify our design choices and a performance evaluation to demonstrate that Obscura maintains reasonable throughput for typical online activities.

2026

Innovation unpacked: How foreign subsidiaries and domestic firms differ across innovation types in a technologically laggard context

Authors
Teixeira, AA; Teixeira, R;

Publication
Strategic Business Research

Abstract

2026

Monetary policy and foreign direct investment: Global evidence, 1970–2023

Authors
Teixeira, AA; Nogueira, MM;

Publication
Global Economics Research

Abstract

2026

Digital Technologies for the Transition to Collaborative Circular Economy Through R-Strategies - Insights from European Ventures

Authors
Fornasiero, R; Dalmarco, G; Zimmermann, R;

Publication
HYBRID HUMAN-AI COLLABORATIVE NETWORKS, PRO-VE 2025, PT II

Abstract
Circular Economy is based on implementation of R-strategies to narrow or close the loop of material flows and to minimize raw material consumption by extending the life cycle of materials. Since this approach is expanding from individual organizational actions to a collaborative approach, the objective of this paper is to analyse the role of digital technologies such as AI and cloud platforms in facilitating and changing the collaboration between stakeholders to improve sustainability. This study adopts a qualitative multi case study methodology, using surveys, interviews and document analysis from 10 new ventures in the agri-food ecosystem supported by the cascade funding programme. The results show that collaboration among actors is changed by the different technologies and strategic drivers of circular economy in the considered ecosystem.

2026

Combining Large Language Models with Procedural Grammars for Scenario Generation in Driving Simulations

Authors
Rodrigues, NB; Coelho, A; Rossetti, RJF;

Publication
GRIVAPP

Abstract

2026

A Secure Architecture for Supply-Chain Orders Exchange Between Textile and Clothing Companies

Authors
Torres, N; Chaves, A; Costa, T; Alves, M; Mota, B; Sousa, C; Malta, S; Pinto, P;

Publication
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, OL2A 2025, PT II

Abstract
DIn the digital transformation of industrial sectors, data is a high-value business asset. How companies manage data between systems within the organization or through networks of business partners impacts their competitive factor. Technological maturity may imply several adversities, such as the lack of interoperability standards for simple and transparent data exchange. This paper presents an architecture that enables secure exchanges of supply chain orders between textile and clothing companies. This architecture is based on Electronic Business (eBIZ) 4.0 and International Data Spaces (IDS) frameworks, fostering trust and widespread adoption of platforms in the industry sector, particularly when handling sensitive supply chain information. The architecture was implemented and validated in 3 use cases with Enterprise Resource Plannings (ERPs) from the same vendor, different vendors, and communication from a ERP to a Web portal. Implementing the proposed architecture impacted efficiency, transparency, and accountability within the supply chain network. The lead times for purchases, provisioning, and the number of additional information requests in the ordering were reduced. In subcontracting, a reduction in non-conformities and an overall improvement in delivery times were verified. Moreover, logistics operations and communication with subcontractors were optimized, leading to faster order reception and reducing informal contacts.

  • 31
  • 4475