VERDERAME, LUCA
VERDERAME, LUCA
100023 - Dipartimento di Informatica, bioingegneria, robotica e ingegneria dei sistemi
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
2023-01-01 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows
2023-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Alice in (Software Supply) Chains: Risk Identification and Evaluation
2022-01-01 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level
2024-01-01 Valeriani, L.; Bianchi, G.; Verderame, L.; Merlo, A.
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems
2020-01-01 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis
2020-01-01 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
Automatic Security Assessment of GitHub Actions Workflows
2022-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Blockchain-based risk mitigation for invoice financing
2019-01-01 Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M.
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Design of a Hardening Module for Automatically Securing Containers
2024-01-01 Verderame, L.; Caviglione, L.
Developing a NATO BYOD security policy
2016-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Droids in disarray: Detecting frame confusion in hybrid android apps
2019-01-01 Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A.
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices
2016-01-01 Merlo, Alessio; Lorrai, Luca; Verderame, Luca
Enabling BYOD through secure meta-market
2014-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Enabling Next-Generation Cyber Ranges with Mobile Security Components
2020-01-01 Russo, Enrico; Verderame, Luca; Merlo, Alessio
Enabling Next-Generation Cyber Ranges with Mobile Security Components
2020-01-01 Russo, E.; Verderame, L.; Merlo, A.
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures
2021-01-01 Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A.
MobHide: App-level runtime data anonymization on mobile
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2GesturePIN: Securing PIN-Based Authentication on Smartwatches | 1-gen-2019 | Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A. | |
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case | 1-gen-2023 | Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L. | |
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows | 1-gen-2023 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
Alice in (Software Supply) Chains: Risk Identification and Evaluation | 1-gen-2022 | Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio | |
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level | 1-gen-2024 | Valeriani, L.; Bianchi, G.; Verderame, L.; Merlo, A. | |
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems | 1-gen-2020 | Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A. | |
APPregator: A Large-Scale Platform for Mobile Security Analysis | 1-gen-2020 | Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A. | |
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L. | |
Automatic Security Assessment of GitHub Actions Workflows | 1-gen-2022 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
Blockchain-based risk mitigation for invoice financing | 1-gen-2019 | Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M. | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Design of a Hardening Module for Automatically Securing Containers | 1-gen-2024 | Verderame, L.; Caviglione, L. | |
Developing a NATO BYOD security policy | 1-gen-2016 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad | |
Droids in disarray: Detecting frame confusion in hybrid android apps | 1-gen-2019 | Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A. | |
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices | 1-gen-2016 | Merlo, Alessio; Lorrai, Luca; Verderame, Luca | |
Enabling BYOD through secure meta-market | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Enabling Next-Generation Cyber Ranges with Mobile Security Components | 1-gen-2020 | Russo, Enrico; Verderame, Luca; Merlo, Alessio | |
Enabling Next-Generation Cyber Ranges with Mobile Security Components | 1-gen-2020 | Russo, E.; Verderame, L.; Merlo, A. | |
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures | 1-gen-2021 | Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A. | |
MobHide: App-level runtime data anonymization on mobile | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A. |