Luca Verderame
Title
Cited by
Cited by
Year
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013
642013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
632012
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
452014
Breaking and fixing the android launching flow
A Armando, A Merlo, M Migliardi, L Verderame
Computers & Security 39, 104-115, 2013
342013
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wirelessá…, 2014
252014
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
242015
An empirical evaluation of the android security framework
A Armando, A Merlo, L Verderame
IFIP International Information Security Conference, 176-189, 2013
182013
Security considerations related to the use of mobile devices in the operation of critical infrastructures
A Armando, A Merlo, L Verderame
International journal of critical infrastructure protection 7 (4), 247-256, 2014
172014
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Informationá…, 2016
102016
Automatic security verification of mobile app configurations
G Costa, A Merlo, L Verderame, A Armando
Future Generation Computer Systems 80, 519-536, 2018
92018
Trusted host-based card emulation
A Armando, A Merlo, L Verderame
2015 International Conference on High Performance Computing & Simulationá…, 2015
92015
Android vs. SEAndroid: An empirical assessment
A Merlo, G Costa, L Verderame, A Armando
Pervasive and Mobile Computing 30, 113-131, 2016
82016
Security issues in the Android cross-layer architecture
A Armando, A Merlo, L Verderame
arXiv preprint arXiv:1209.0687, 2012
62012
Securing the" Bring Your Own Device" Policy.
A Armando, G Costa, A Merlo, L Verderame
J. Internet Serv. Inf. Secur. 2 (3/4), 3-17, 2012
62012
On the (Un) Reliability of Privacy Policies in Android Apps
L Verderame, D Caputo, A Romdhana, A Merlo
arXiv preprint arXiv:2004.08559, 2020
32020
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices
M Guerar, L Verderame, A Merlo, F Palmieri, M Migliardi, L Vallerini
ACM Transactions on Cyber-Physical Systems 4 (3), 1-19, 2020
32020
Efficient trusted host-based card emulation on TEE-enabled Android devices
A Merlo, L Lorrai, L Verderame
2016 International Conference on High Performance Computing & Simulationá…, 2016
32016
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
M Guerar, A Merlo, M Migliardi, F Palmieri, L Verderame
IEEE Transactions on Engineering Management, 2020
22020
Obfuscapk: An open-source black-box obfuscation tool for Android apps
S Aonzo, GC Georgiu, L Verderame, A Merlo
SoftwareX 11, 100403, 2020
22020
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
M Guerar, L Verderame, M Migliardi, A Merlo
2019 IEEE 28th International Conference on Enabling Technologiesá…, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20