Luca Verderame
Orcid: 0000-0001-7155-7429
According to our database1,
Luca Verderame
authored at least 57 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications.
SoftwareX, July, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
ACM Comput. Surv., 2022
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
Proceedings of the Quality of Information and Communications Technology, 2022
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection.
Pervasive Mob. Comput., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Internet Serv. Inf. Secur., 2021
Int. J. Grid Util. Comput., 2021
CoRR, 2021
Comput. Secur., 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Engineering Management, 2020
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020
SoftwareX, 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the Testing Software and Systems, 2020
Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
Future Gener. Comput. Syst., 2018
2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
Proceedings of the International Conference on Military Communications and Information Systems, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
2014
Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2012
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012