Search Results - "Merlo, Alessio"

Refine Results
  1. 1

    Obfuscapk: An open-source black-box obfuscation tool for Android apps by Aonzo, Simone, Georgiu, Gabriel Claudiu, Verderame, Luca, Merlo, Alessio

    Published in SoftwareX (01-01-2020)
    “…Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code)…”
    Get full text
    Journal Article
  2. 2

    MaCySTe: A virtual testbed for maritime cybersecurity by Longo, Giacomo, Orlich, Alessandro, Musante, Stefano, Merlo, Alessio, Russo, Enrico

    Published in SoftwareX (01-07-2023)
    “…The increasing reliance on technology and automation in the maritime sector has made it more vulnerable to cyberattacks. Cyber threats to ships and offshore…”
    Get full text
    Journal Article
  3. 3

    SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications by Pagano, Francesco, Romdhana, Andrea, Caputo, Davide, Verderame, Luca, Merlo, Alessio

    Published in SoftwareX (01-07-2023)
    “…Despite decades of research, the automatic detection of vulnerabilities in mobile apps remains an open challenge. Among the possible solutions, SAST tools…”
    Get full text
    Journal Article
  4. 4

    A Fraud-Resilient Blockchain-Based Solution for Invoice Financing by Guerar, Meriem, Merlo, Alessio, Migliardi, Mauro, Palmieri, Francesco, Verderame, Luca

    “…Invoice financing has been a steadily growing component of the financing market as a whole for the last few years, and, in 2016, it became the third largest…”
    Get full text
    Journal Article
  5. 5

    A data anonymization methodology for security operations centers: Balancing data protection and security in industrial systems by Longo, Giacomo, Lupia, Francesco, Merlo, Alessio, Pagano, Francesco, Russo, Enrico

    Published in Information sciences (01-02-2025)
    “…In an era where industrial Security Operations Centers (SOCs) are paramount to enabling cybersecurity, they can unintentionally become enablers of intellectual…”
    Get full text
    Journal Article
  6. 6

    PARIOT: Anti-repackaging for IoT firmware integrity by Verderame, Luca, Ruggia, Antonio, Merlo, Alessio

    “…IoT repackaging refers to an attack devoted to tampering with a legitimate firmware package by modifying its content (e.g., injecting some malicious code) and…”
    Get full text
    Journal Article
  7. 7

    A survey on energy-aware security mechanisms by Merlo, Alessio, Migliardi, Mauro, Caviglione, Luca

    Published in Pervasive and mobile computing (01-12-2015)
    “…The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to deepen the investigation of security aspects. In parallel,…”
    Get full text
    Journal Article
  8. 8

    Attacking (and Defending) the Maritime Radar System by Longo, Giacomo, Russo, Enrico, Armando, Alessandro, Merlo, Alessio

    “…The operation of radar equipment is one of the key facilities navigators use to gather situational awareness about their surroundings. With an ever-increasing…”
    Get full text
    Journal Article
  9. 9

    Enabling Real-Time Remote Monitoring of Ships by Lossless Protocol Transformations by Longo, Giacomo, Orlich, Alessandro, Merlo, Alessio, Russo, Enrico

    “…This paper uses data processing techniques to reduce the required transmission bandwidth in ship-to-shore communications. The proposed framework (ONline…”
    Get full text
    Journal Article
  10. 10

    Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices by Guerar, Meriem, Merlo, Alessio, Migliardi, Mauro

    Published in Future generation computer systems (01-05-2018)
    “…A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication…”
    Get full text
    Journal Article
  11. 11

    You Shall not Repackage! Demystifying Anti-Repackaging on Android by Merlo, Alessio, Ruggia, Antonio, Sciolla, Luigi, Verderame, Luca

    Published in Computers & security (01-04-2021)
    “…•We assess the state-of-the-art of anti-repackaging schemes on Android.•We describe the main attacking methodologies to anti-repackaging on Android.•We provide…”
    Get full text
    Journal Article
  12. 12

    LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework by Russo, Enrico, Costa, Gabriele, Longo, Giacomo, Armando, Alessandro, Merlo, Alessio

    “…The rising of the Cyber-Physical System (CPS) and the Industry 4.0 paradigms demands the design and implementation of Digital Twin Frameworks (DTFs) that may…”
    Get full text
    Journal Article
  13. 13

    Assessing the security of inter-app communications in android through reinforcement learning by Romdhana, Andrea, Merlo, Alessio, Ceccato, Mariano, Tonella, Paolo

    Published in Computers & security (01-08-2023)
    “…A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the reuse of functionality across apps and components through…”
    Get full text
    Journal Article
  14. 14

    Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT by Guerar, Meriem, Merlo, Alessio, Migliardi, Mauro, Palmieri, Francesco

    Published in Computers & security (01-09-2018)
    “…•Movement-driven invisible CAPTCHA for smartphones.•Overcome the limitations of CAPTCHAs without requiring user input.•Reliably and transparently identify the…”
    Get full text
    Journal Article
  15. 15

    You Can't Always Get What You Want: Towards User-Controlled Privacy on Android by Caputo, Davide, Pagano, Francesco, Bottino, Giovanni, Verderame, Luca, Merlo, Alessio

    “…Mobile applications (hereafter, apps) collect a plethora of information regarding the user behavior and his device through third-party analytics libraries…”
    Get full text
    Journal Article
  16. 16

    Securing PIN‐based authentication in smartwatches with just two gestures by Guerar, Meriem, Migliardi, Mauro, Palmieri, Francesco, Verderame, Luca, Merlo, Alessio

    Published in Concurrency and computation (25-09-2020)
    “…Summary Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to develop sophisticated applications that make daily life easier and…”
    Get full text
    Journal Article
  17. 17

    ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection by Merlo, Alessio, Ruggia, Antonio, Sciolla, Luigi, Verderame, Luca

    Published in Pervasive and mobile computing (01-09-2021)
    “…App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild to fool the final user into installing the…”
    Get full text
    Journal Article
  18. 18

    Automatic security verification of mobile app configurations by Costa, Gabriele, Merlo, Alessio, Verderame, Luca, Armando, Alessandro

    Published in Future generation computer systems (01-03-2018)
    “…The swift and continuous evolution of mobile devices is encouraging both private and public organizations to adopt the Bring Your Own Device (BYOD) paradigm…”
    Get full text
    Journal Article
  19. 19

    Low-Resource Footprint, Data-Driven Malware Detection on Android by Aonzo, Simone, Merlo, Alessio, Migliardi, Mauro, Oneto, Luca, Palmieri, Francesco

    Published in IEEE transactions on sustainable computing (01-04-2020)
    “…Resource-constrained systems are becoming more and more common as users migrate from PCs to mobile devices and as IoT systems enter the mainstream. At the same…”
    Get full text
    Journal Article
  20. 20

    Securing the "Bring Your Own Device" Paradigm by Armando, Alessandro, Costa, Gabriele, Verderame, Luca, Merlo, Alessio

    Published in Computer (Long Beach, Calif.) (01-06-2014)
    “…The current mobile application distribution model cannot cope with the complex security requirements of the emerging "bring your own device" (BYOD) paradigm. A…”
    Get full text
    Journal Article