Sfoglia per Autore
Securing the “bring your own device” policy
2012-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)
2012-01-01 Armando, Alessandro; Merlo, Alessio; M., Migliardi; Verderame, Luca
Market-based security for mobile devices
2013-01-01 Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Trustworthy Opportunistic Access to the Internet of Services
2013-01-01 Armando, Alessandro; Aniello, Castiglione; Costa, Gabriele; Ugo, Fiore; Merlo, Alessio; Verderame, Luca; Ilsun, You
Breaking and fixing the Android Launching Flow
2013-01-01 Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca
An Empirical Evaluation of the Android Security Framework
2013-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Formal modeling and automatic enforcement of Bring Your Own Device policies
2014-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Security considerations related to the use of mobile devices in the operation of critical infrastructures
2014-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Securing the ``Bring Your Own Device'' Paradigm
2014-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Enabling BYOD through secure meta-market
2014-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Trusted host-based card emulation
2015-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices
2016-01-01 Merlo, Alessio; Lorrai, Luca; Verderame, Luca
Android vs. SEAndroid: An empirical assessment
2016-01-01 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
Developing a NATO BYOD security policy
2016-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps. Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps
2017-01-01 Costa, G.; Armando, A.; Verderame, L.; Biondo, D.; Bocci, G.; Mammoliti, R.; Toma, A.
Automatic security verification of mobile app configurations
2018-01-01 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Automated Security Analysis of IoT Software Updates
2019-01-01 Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A.
Securing PIN-based authentication in smartwatches with just two gestures
2019-01-01 Guerar, M.; Migliardi, M.; Palmieri, F.; Verderame, L.; Merlo, A.
Droids in disarray: Detecting frame confusion in hybrid android apps
2019-01-01 Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Securing the “bring your own device” policy | 1-gen-2012 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) | 1-gen-2012 | Armando, Alessandro; Merlo, Alessio; M., Migliardi; Verderame, Luca | |
Market-based security for mobile devices | 1-gen-2013 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Trustworthy Opportunistic Access to the Internet of Services | 1-gen-2013 | Armando, Alessandro; Aniello, Castiglione; Costa, Gabriele; Ugo, Fiore; Merlo, Alessio; Verderame, Luca; Ilsun, You | |
Breaking and fixing the Android Launching Flow | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca | |
An Empirical Evaluation of the Android Security Framework | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Verderame, Luca | |
Formal modeling and automatic enforcement of Bring Your Own Device policies | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Security considerations related to the use of mobile devices in the operation of critical infrastructures | 1-gen-2014 | Armando, Alessandro; Merlo, Alessio; Verderame, Luca | |
Securing the ``Bring Your Own Device'' Paradigm | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Enabling BYOD through secure meta-market | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Trusted host-based card emulation | 1-gen-2015 | Armando, Alessandro; Merlo, Alessio; Verderame, Luca | |
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices | 1-gen-2016 | Merlo, Alessio; Lorrai, Luca; Verderame, Luca | |
Android vs. SEAndroid: An empirical assessment | 1-gen-2016 | Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro | |
Developing a NATO BYOD security policy | 1-gen-2016 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad | |
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps. Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps | 1-gen-2017 | Costa, G.; Armando, A.; Verderame, L.; Biondo, D.; Bocci, G.; Mammoliti, R.; Toma, A. | |
Automatic security verification of mobile app configurations | 1-gen-2018 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro | |
Automated Security Analysis of IoT Software Updates | 1-gen-2019 | Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A. | |
Securing PIN-based authentication in smartwatches with just two gestures | 1-gen-2019 | Guerar, M.; Migliardi, M.; Palmieri, F.; Verderame, L.; Merlo, A. | |
Droids in disarray: Detecting frame confusion in hybrid android apps | 1-gen-2019 | Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile