Luca Verderame
TitleCited byYear
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013
582013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
542012
Breaking and fixing the android launching flow
A Armando, A Merlo, M Migliardi, L Verderame
Computers & Security 39, 104-115, 2013
342013
Securing the" Bring Your Own Device" Paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
302014
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
182015
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
182014
An empirical evaluation of the android security framework
A Armando, A Merlo, L Verderame
IFIP International Information Security Conference, 176-189, 2013
162013
Security considerations related to the use of mobile devices in the operation of critical infrastructures
A Armando, A Merlo, L Verderame
International Journal of Critical Infrastructure Protection 7 (4), 247-256, 2014
122014
Security issues in the Android cross-layer architecture
A Armando, A Merlo, L Verderame
arXiv preprint arXiv:1209.0687, 2012
82012
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Information …, 2016
72016
Automatic security verification of mobile app configurations
G Costa, A Merlo, L Verderame, A Armando
Future Generation Computer Systems 80, 519-536, 2018
62018
Android vs. SEAndroid: An empirical assessment
A Merlo, G Costa, L Verderame, A Armando
Pervasive and Mobile Computing 30, 113-131, 2016
62016
Trusted host-based card emulation
A Armando, A Merlo, L Verderame
2015 International Conference on High Performance Computing & Simulation …, 2015
62015
Securing the" Bring Your Own Device" Policy.
A Armando, G Costa, A Merlo, L Verderame
J. Internet Serv. Inf. Secur. 2 (3/4), 3-17, 2012
62012
Efficient trusted host-based card emulation on TEE-enabled Android devices
A Merlo, L Lorrai, L Verderame
2016 International Conference on High Performance Computing & Simulation …, 2016
22016
Trustworthy opportunistic access to the internet of services
A Armando, A Castiglione, G Costa, U Fiore, A Merlo, L Verderame, I You
Information and Communication Technology-EurAsia Conference, 469-478, 2013
22013
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps
D Caputo, L Verderame, S Aonzo, A Merlo
IFIP Annual Conference on Data and Applications Security and Privacy, 121-139, 2019
2019
Blockchain-based risk mitigation for invoice financing
M Guerar, L Verderame, A Merlo, M Migliardi
Proceedings of the 23rd International Database Applications & Engineering …, 2019
2019
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps
G Costa, A Armando, L Verderame, D Biondo, G Bocci, R Mammoliti, ...
Adaptive Mobile Computing, 217-235, 2017
2017
Market-Based Security for Mobile devices
G Costa, A Merlo, L Verderame
Mobile Computing, 32, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20