Obfuscapk: An open-source black-box obfuscation tool for Android apps S Aonzo, GC Georgiu, L Verderame, A Merlo SoftwareX 11, 100403, 2020 | 88 | 2020 |
Bring your own device, securely A Armando, G Costa, A Merlo Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013 | 79 | 2013 |
Would you mind forking this process? A denial of service attack on Android (and some countermeasures) A Armando, A Merlo, M Migliardi, L Verderame Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 77 | 2012 |
Securing the" bring your own device" paradigm A Armando, G Costa, L Verderame, A Merlo Computer 47 (6), 48-56, 2014 | 59 | 2014 |
A fraud-resilient blockchain-based solution for invoice financing M Guerar, A Merlo, M Migliardi, F Palmieri, L Verderame IEEE Transactions on Engineering Management 67 (4), 1086-1098, 2020 | 55 | 2020 |
Gotta CAPTCHA’Em all: a survey of 20 Years of the human-or-computer Dilemma M Guerar, L Verderame, M Migliardi, F Palmieri, A Merlo ACM Computing Surveys (CSUR) 54 (9), 1-33, 2021 | 45 | 2021 |
On the (un) reliability of privacy policies in android apps L Verderame, D Caputo, A Romdhana, A Merlo 2020 international joint conference on neural networks (IJCNN), 1-9, 2020 | 38 | 2020 |
Breaking and fixing the android launching flow A Armando, A Merlo, M Migliardi, L Verderame Computers & Security 39, 104-115, 2013 | 37 | 2013 |
Enabling BYOD through secure meta-market A Armando, G Costa, A Merlo, L Verderame Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 34 | 2014 |
CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices M Guerar, L Verderame, A Merlo, F Palmieri, M Migliardi, L Vallerini ACM Transactions on Cyber-Physical Systems 4 (3), 1-19, 2020 | 33 | 2020 |
Fine-hearing Google Home: why silence will not protect your privacy. D Caputo, L Verderame, A Ranieri, A Merlo, L Caviglione J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (1), 35-53, 2020 | 28 | 2020 |
Formal modeling and automatic enforcement of Bring Your Own Device policies A Armando, G Costa, A Merlo, L Verderame International Journal of Information Security 14, 123-140, 2015 | 27 | 2015 |
Securing PIN‐based authentication in smartwatches with just two gestures M Guerar, M Migliardi, F Palmieri, L Verderame, A Merlo Concurrency and Computation: Practice and Experience 32 (18), e5549, 2020 | 25 | 2020 |
Security considerations related to the use of mobile devices in the operation of critical infrastructures A Armando, A Merlo, L Verderame International journal of critical infrastructure protection 7 (4), 247-256, 2014 | 23 | 2014 |
Automatic security assessment of github actions workflows G Benedetti, L Verderame, A Merlo Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022 | 22 | 2022 |
You shall not repackage! demystifying anti-repackaging on android A Merlo, A Ruggia, L Sciolla, L Verderame Computers & Security 103, 102181, 2021 | 21 | 2021 |
An empirical evaluation of the android security framework A Armando, A Merlo, L Verderame Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 21 | 2013 |
Blockchain-based risk mitigation for invoice financing M Guerar, L Verderame, A Merlo, M Migliardi Proceedings of the 23rd International Database Applications & Engineering …, 2019 | 16 | 2019 |
2GesturePIN: Securing PIN-Based authentication on smartwatches M Guerar, L Verderame, M Migliardi, A Merlo 2019 IEEE 28th International Conference on Enabling Technologies …, 2019 | 15 | 2019 |
Automatic security verification of mobile app configurations G Costa, A Merlo, L Verderame, A Armando Future Generation Computer Systems 80, 519-536, 2018 | 15 | 2018 |