VERDERAME, LUCA
VERDERAME, LUCA
100023 - Dipartimento di Informatica, bioingegneria, robotica e ingegneria dei sistemi
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
2020-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
2023-01-01 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows
2023-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis
2019-01-01 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
Alice in (Software Supply) Chains: Risk Identification and Evaluation
2022-01-01 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
An Empirical Evaluation of the Android Security Framework
2013-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level
2024-01-01 Valeriani, L.; Bianchi, G.; Verderame, L.; Merlo, A.
Android vs. SEAndroid: An empirical assessment
2016-01-01 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems
2020-01-01 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis
2020-01-01 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
2021-01-01 Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L.
Automated Security Analysis of IoT Software Updates
2019-01-01 Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A.
Automatic Security Assessment of GitHub Actions Workflows
2022-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Automatic security verification of mobile app configurations
2018-01-01 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Blockchain-based risk mitigation for invoice financing
2019-01-01 Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M.
Breaking and fixing the Android Launching Flow
2013-01-01 Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices
2020-01-01 Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2GesturePIN: Securing PIN-Based Authentication on Smartwatches | 1-gen-2019 | Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A. | |
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing | 1-gen-2020 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca | |
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case | 1-gen-2023 | Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L. | |
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows | 1-gen-2023 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
A secure cloud-edges computing architecture for metagenomics analysis | 1-gen-2019 | Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A. | |
Alice in (Software Supply) Chains: Risk Identification and Evaluation | 1-gen-2022 | Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio | |
An Empirical Evaluation of the Android Security Framework | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Verderame, Luca | |
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level | 1-gen-2024 | Valeriani, L.; Bianchi, G.; Verderame, L.; Merlo, A. | |
Android vs. SEAndroid: An empirical assessment | 1-gen-2016 | Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro | |
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems | 1-gen-2020 | Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A. | |
APPregator: A Large-Scale Platform for Mobile Security Analysis | 1-gen-2020 | Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A. | |
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L. | |
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection | 1-gen-2021 | Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L. | |
Automated Security Analysis of IoT Software Updates | 1-gen-2019 | Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A. | |
Automatic Security Assessment of GitHub Actions Workflows | 1-gen-2022 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
Automatic security verification of mobile app configurations | 1-gen-2018 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro | |
Blockchain-based risk mitigation for invoice financing | 1-gen-2019 | Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M. | |
Breaking and fixing the Android Launching Flow | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices | 1-gen-2020 | Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca |