[go: up one dir, main page]

Follow
Luca Verderame
Title
Cited by
Cited by
Year
Obfuscapk: An open-source black-box obfuscation tool for Android apps
S Aonzo, GC Georgiu, L Verderame, A Merlo
SoftwareX 11, 100403, 2020
1292020
Gotta CAPTCHA’Em all: a survey of 20 Years of the human-or-computer Dilemma
M Guerar, L Verderame, M Migliardi, F Palmieri, A Merlo
ACM Computing Surveys (CSUR) 54 (9), 1-33, 2021
902021
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
812013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
792012
A fraud-resilient blockchain-based solution for invoice financing
M Guerar, A Merlo, M Migliardi, F Palmieri, L Verderame
IEEE Transactions on Engineering Management 67 (4), 1086-1098, 2020
732020
On the (un) reliability of privacy policies in android apps
L Verderame, D Caputo, A Romdhana, A Merlo
2020 international joint conference on neural networks (IJCNN), 1-9, 2020
622020
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
572014
CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices
M Guerar, L Verderame, A Merlo, F Palmieri, M Migliardi, L Vallerini
ACM Transactions on Cyber-Physical Systems 4 (3), 1-19, 2020
442020
Automatic security assessment of github actions workflows
G Benedetti, L Verderame, A Merlo
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022
402022
Breaking and fixing the android launching flow
A Armando, A Merlo, M Migliardi, L Verderame
Computers & Security 39, 104-115, 2013
392013
Fine-hearing Google Home: why silence will not protect your privacy.
D Caputo, L Verderame, A Ranieri, A Merlo, L Caviglione
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (1), 35-53, 2020
352020
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
352014
Securing PIN‐based authentication in smartwatches with just two gestures
M Guerar, M Migliardi, F Palmieri, L Verderame, A Merlo
Concurrency and Computation: Practice and Experience 32 (18), e5549, 2020
342020
You shall not repackage! demystifying anti-repackaging on android
A Merlo, A Ruggia, L Sciolla, L Verderame
Computers & Security 103, 102181, 2021
322021
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
272015
An empirical evaluation of the android security framework
A Armando, A Merlo, L Verderame
IFIP International Information Security Conference, 176-189, 2013
262013
Security considerations related to the use of mobile devices in the operation of critical infrastructures
A Armando, A Merlo, L Verderame
International journal of critical infrastructure protection 7 (4), 247-256, 2014
252014
2GesturePIN: Securing PIN-Based authentication on smartwatches
M Guerar, L Verderame, M Migliardi, A Merlo
2019 IEEE 28th International Conference on Enabling Technologies …, 2019
222019
Blockchain-based risk mitigation for invoice financing
M Guerar, L Verderame, A Merlo, M Migliardi
Proceedings of the 23rd International Database Applications & Engineering …, 2019
202019
Repack me if you can: An anti-repackaging solution based on android virtualization
A Ruggia, E Losiouk, L Verderame, M Conti, A Merlo
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
182021
The system can't perform the operation now. Try again later.
Articles 1–20