Sfoglia per Autore
Automated Security Analysis of IoT Software Updates
2019-01-01 Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A.
A secure cloud-edges computing architecture for metagenomics analysis
2019-01-01 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
Droids in disarray: Detecting frame confusion in hybrid android apps
2019-01-01 Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A.
Enabling Next-Generation Cyber Ranges with Mobile Security Components
2020-01-01 Russo, Enrico; Verderame, Luca; Merlo, Alessio
On the (Un)Reliability of Privacy Policies in Android Apps
2020-01-01 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices
2020-01-01 Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
2020-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
Towards a SIP-based DDoS Attack to the 4G Network
2020-01-01 Cibin, N.; Guerar, M.; Merlo, A.; Migliardi, M.; Verderame, L.
Fine-hearing Google Home: why silence will not protect your privacy
2020-01-01 Caputo, D.; Verderame, L.; Ranieri, A.; Merlo, A.; Caviglione, L.
Obfuscapk: An open-source black-box obfuscation tool for Android apps
2020-01-01 Aonzo, S.; Georgiu, G. C.; Verderame, L.; Merlo, A.
MobHide: App-level runtime data anonymization on mobile
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis
2020-01-01 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Enabling Next-Generation Cyber Ranges with Mobile Security Components
2020-01-01 Russo, E.; Verderame, L.; Merlo, A.
Finsec 2019 preface
2020-01-01 Abie, H.; Ranise, S.; Verderame, L.; Siena, A.
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems
2020-01-01 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
Deep adversarial learning on google home devices
2021-01-01 Ranieri, A.; Caputo, D.; Verderame, L.; Merlo, A.; Caviglione, L.
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures
2021-01-01 Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A.
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
2021-01-01 Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Automated Security Analysis of IoT Software Updates | 1-gen-2019 | Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A. | |
A secure cloud-edges computing architecture for metagenomics analysis | 1-gen-2019 | Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A. | |
2GesturePIN: Securing PIN-Based Authentication on Smartwatches | 1-gen-2019 | Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A. | |
Droids in disarray: Detecting frame confusion in hybrid android apps | 1-gen-2019 | Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A. | |
Enabling Next-Generation Cyber Ranges with Mobile Security Components | 1-gen-2020 | Russo, Enrico; Verderame, Luca; Merlo, Alessio | |
On the (Un)Reliability of Privacy Policies in Android Apps | 1-gen-2020 | Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A. | |
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L. | |
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices | 1-gen-2020 | Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca | |
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing | 1-gen-2020 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca | |
Towards a SIP-based DDoS Attack to the 4G Network | 1-gen-2020 | Cibin, N.; Guerar, M.; Merlo, A.; Migliardi, M.; Verderame, L. | |
Fine-hearing Google Home: why silence will not protect your privacy | 1-gen-2020 | Caputo, D.; Verderame, L.; Ranieri, A.; Merlo, A.; Caviglione, L. | |
Obfuscapk: An open-source black-box obfuscation tool for Android apps | 1-gen-2020 | Aonzo, S.; Georgiu, G. C.; Verderame, L.; Merlo, A. | |
MobHide: App-level runtime data anonymization on mobile | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A. | |
APPregator: A Large-Scale Platform for Mobile Security Analysis | 1-gen-2020 | Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A. | |
Enabling Next-Generation Cyber Ranges with Mobile Security Components | 1-gen-2020 | Russo, E.; Verderame, L.; Merlo, A. | |
Finsec 2019 preface | 1-gen-2020 | Abie, H.; Ranise, S.; Verderame, L.; Siena, A. | |
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems | 1-gen-2020 | Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A. | |
Deep adversarial learning on google home devices | 1-gen-2021 | Ranieri, A.; Caputo, D.; Verderame, L.; Merlo, A.; Caviglione, L. | |
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures | 1-gen-2021 | Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A. | |
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection | 1-gen-2021 | Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile