Luca Verderame

Orcid: 0000-0001-7155-7429

According to our database1, Luca Verderame authored at least 57 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Design of a Hardening Module for Automatically Securing Containers.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications.
SoftwareX, July, 2023

You Can't Always Get What You Want: Towards User-Controlled Privacy on Android.
IEEE Trans. Dependable Secur. Comput., 2023

PARIOT: Anti-repackaging for IoT firmware integrity.
J. Netw. Comput. Appl., 2023

SecCo: Automated Services to Secure Containers in the DevOps Paradigm.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma.
ACM Comput. Surv., 2022

Automatic Security Assessment of GitHub Actions Workflows.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Alice in (Software Supply) Chains: Risk Identification and Evaluation.
Proceedings of the Quality of Information and Communications Technology, 2022

A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021

ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection.
Pervasive Mob. Comput., 2021

Understanding Fuchsia Security.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Deep Adversarial Learning on Google Home devices.
J. Internet Serv. Inf. Secur., 2021

DIOXIN: runtime security policy enforcement of fog applications.
Int. J. Grid Util. Comput., 2021

PATRIOT: Anti-Repackaging for IoT Firmware.
CoRR, 2021

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma.
CoRR, 2021

You Shall not Repackage! Demystifying Anti-Repackaging on Android.
Comput. Secur., 2021

Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing.
IEEE Trans. Engineering Management, 2020

CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020

Obfuscapk: An open-source black-box obfuscation tool for Android apps.
SoftwareX, 2020

Fine-hearing Google Home: why silence will not protect your privacy.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A secure cloud-edges computing architecture for metagenomics analysis.
Future Gener. Comput. Syst., 2020

You Shall not Repackage! A Journey into the World of Anti-Repackaging on Android.
CoRR, 2020

Securing PIN-based authentication in smartwatches with just two gestures.
Concurr. Comput. Pract. Exp., 2020

APPregator: A Large-Scale Platform for Mobile Security Analysis.
Proceedings of the Testing Software and Systems, 2020

Enabling Next-Generation Cyber Ranges with Mobile Security Components.
Proceedings of the Testing Software and Systems, 2020

Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

On the (Un)Reliability of Privacy Policies in Android Apps.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards a SIP-based DDoS Attack to the 4G Network.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

MobHide: App-Level Runtime Data Anonymization on Mobile.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Automated Security Analysis of IoT Software Updates.
Proceedings of the Information Security Theory and Practice, 2019

Towards Policy-Driven Monitoring of Fog Applications.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2GesturePIN: Securing PIN-Based Authentication on Smartwatches.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Blockchain-based risk mitigation for invoice financing.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Automatic security verification of mobile app configurations.
Future Gener. Comput. Syst., 2018

2016
Android vs. SEAndroid: An empirical assessment.
Pervasive Mob. Comput., 2016

Efficient trusted host-based card emulation on TEE-enabled Android devices.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Developing a NATO BYOD security policy.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

2015
Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

Trusted host-based card emulation.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

2014
Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014

Securing the "Bring Your Own Device" Paradigm.
Computer, 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
Market-Based Security for Mobile Devices.
ERCIM News, 2013

Breaking and fixing the Android Launching Flow.
Comput. Secur., 2013

An Empirical Evaluation of the Android Security Framework.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

Security Issues in the Android Cross-Layer Architecture
CoRR, 2012

Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012


  Loading...