Alessio Merlo

Orcid: 0000-0002-2272-2376

According to our database1, Alessio Merlo authored at least 130 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications.
SoftwareX, July, 2023

MaCySTe: A virtual testbed for maritime cybersecurity.
SoftwareX, July, 2023

Enabling Real-Time Remote Monitoring of Ships by Lossless Protocol Transformations.
IEEE Trans. Intell. Transp. Syst., 2023

Attacking (and Defending) the Maritime Radar System.
IEEE Trans. Inf. Forensics Secur., 2023

LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework.
IEEE Trans. Dependable Secur. Comput., 2023

You Can't Always Get What You Want: Towards User-Controlled Privacy on Android.
IEEE Trans. Dependable Secur. Comput., 2023

PARIOT: Anti-repackaging for IoT firmware integrity.
J. Netw. Comput. Appl., 2023

Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection.
CoRR, 2023

Assessing the security of inter-app communications in android through reinforcement learning.
Comput. Secur., 2023

Cloud-Native Application Security Training and Testing with Cyber Ranges.
Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023), 2023

SecCo: Automated Services to Secure Containers in the DevOps Paradigm.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Electronic Attacks as a Cyber False Flag against Maritime Radars Systems.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Android, Notify Me When It Is Time To Go Phishing.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Deep Reinforcement Learning for Black-box Testing of Android Apps.
ACM Trans. Softw. Eng. Methodol., 2022

Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma.
ACM Comput. Surv., 2022

Automatic Security Assessment of GitHub Actions Workflows.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Alice in (Software Supply) Chains: Risk Identification and Evaluation.
Proceedings of the Quality of Information and Communications Technology, 2022

IFRIT: Focused Testing through Deep Reinforcement Learning.
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022

A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Training the Maritime Security Operations Centre Teams.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021

ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection.
Pervasive Mob. Comput., 2021

Understanding Fuchsia Security.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Deep Adversarial Learning on Google Home devices.
J. Internet Serv. Inf. Secur., 2021

DIOXIN: runtime security policy enforcement of fog applications.
Int. J. Grid Util. Comput., 2021

PATRIOT: Anti-Repackaging for IoT Firmware.
CoRR, 2021

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma.
CoRR, 2021

You Shall not Repackage! Demystifying Anti-Repackaging on Android.
Comput. Secur., 2021

Keynote: ARES: A Deep Reinforcement Learning Tool for Black-Box Testing of Android Apps.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

COSMO: Code Coverage Made Easier for Android.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Low-Resource Footprint, Data-Driven Malware Detection on Android.
IEEE Trans. Sustain. Comput., 2020

A Fraud-Resilient Blockchain-Based Solution for Invoice Financing.
IEEE Trans. Engineering Management, 2020

CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020

Obfuscapk: An open-source black-box obfuscation tool for Android apps.
SoftwareX, 2020

Fine-hearing Google Home: why silence will not protect your privacy.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A secure cloud-edges computing architecture for metagenomics analysis.
Future Gener. Comput. Syst., 2020

You Shall not Repackage! A Journey into the World of Anti-Repackaging on Android.
CoRR, 2020

Securing PIN-based authentication in smartwatches with just two gestures.
Concurr. Comput. Pract. Exp., 2020

APPregator: A Large-Scale Platform for Mobile Security Analysis.
Proceedings of the Testing Software and Systems, 2020

Enabling Next-Generation Cyber Ranges with Mobile Security Components.
Proceedings of the Testing Software and Systems, 2020

Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

On the (Un)Reliability of Privacy Policies in Android Apps.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards a SIP-based DDoS Attack to the 4G Network.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

MobHide: App-Level Runtime Data Anonymization on Mobile.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Behavioral-Anomaly Detection in Forensics Analysis.
IEEE Secur. Priv., 2019

Automated Security Analysis of IoT Software Updates.
Proceedings of the Information Security Theory and Practice, 2019

Towards Policy-Driven Monitoring of Fog Applications.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2GesturePIN: Securing PIN-Based Authentication on Smartwatches.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Blockchain-based risk mitigation for invoice financing.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Secur. Comput., 2018

Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices.
Future Gener. Comput. Syst., 2018

Automatic security verification of mobile app configurations.
Future Gener. Comput. Syst., 2018

HPC & Co strike back: Where are distributed paradigms heading toward?
Concurr. Comput. Pract. Exp., 2018

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Comput. Secur., 2018

Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Comput. Secur., 2018

On The Case of Blockchain Adoption in the Internet of Things.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

A Bio-inspired Approach to Attack Graphs Analysis.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Phishing Attacks on Modern Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Covert Channels in IoT Deployments Through Data Hiding Techniques.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

RmPerm: A Tool for Android Permissions Removal.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

RiskInDroid: Machine Learning-Based Risk Analysis on Android.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

From HPC to Security: How to Change Research Focus and Survive - A Career Perspective.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

BYODCert: Toward a Cross-Organizational BYOD Paradigm.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Dynamic Latency Sensitivity Recognition: An Application to Energy Saving.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Android vs. SEAndroid: An empirical assessment.
Pervasive Mob. Comput., 2016

Generating statistical insights into network behavior using SKETURE.
J. High Speed Networks, 2016

IPS-based reduction of network energy consumption.
Log. J. IGPL, 2016

Efficient trusted host-based card emulation on TEE-enabled Android devices.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Developing a NATO BYOD security policy.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Balancing Delays and Energy Consumption in IPS-Enabled Networks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
A survey on energy-aware security mechanisms.
Pervasive Mob. Comput., 2015

Measuring and estimating power consumption in Android to support energy-based intrusion detection.
J. Comput. Secur., 2015

Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015

A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Trusted host-based card emulation.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

SKETURE: A Sketch-based Packet Analysis Tool.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Secur. Comput., 2014

Anomaly Detection in Computer Networks: A State-of-the-Art Review.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Mobile App Security Analysis with the MAVeriC Static Analysis Module.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

A taxonomy-based model of security and privacy in online social networks.
Int. J. Comput. Sci. Eng., 2014

Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014

Securing the "Bring Your Own Device" Paradigm.
Computer, 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Optimizing Network Energy Consumption through Intrusion Prevention Systems.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

On energy-based profiling of malware in Android.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
Improving energy efficiency in distributed intrusion detection systems.
J. High Speed Networks, 2013

Performance assessment and analysis of DNS tunneling tools.
Log. J. IGPL, 2013

Secure cooperative access control on grid.
Future Gener. Comput. Syst., 2013

Market-Based Security for Mobile Devices.
ERCIM News, 2013

Breaking and fixing the Android Launching Flow.
Comput. Secur., 2013

An Empirical Evaluation of the Android Security Framework.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards energy-aware intrusion detection systems on mobile devices.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

A Denial of Service Attack to GSM Networks via Attach Procedure.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
The energy impact of security mechanisms in modern mobile devices.
Netw. Secur., 2012

Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

Security Issues in the Android Cross-Layer Architecture
CoRR, 2012

Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap.
Proceedings of the Tests and Proofs - 6th International Conference, 2012

Formal Analysis of a Privacy-Preserving Billing Protocol.
Proceedings of the Smart Grid Security - First International Workshop, 2012

Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012

2011
Quality of Service on Grid: architectural and methodological issues.
Concurr. Comput. Pract. Exp., 2011

On Re-use of randomness in broadcast encryption.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Modeling the energy consumption of distributed IDS: A step towards Green security.
Proceedings of the MIPRO, 2011

A Comparative Performance Evaluation of DNS Tunneling Tools.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Beaconing support in publish-subscribe middleware for vehicular applications.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

Cooperative access control for the Grid.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Efficient management of resources and entities using the HyVonNe P2P architecture.
Int. J. Grid Util. Comput., 2009

2008
Managing Networks of Mobiles Entities Using the HyVonNe P2P Architecture.
Proceedings of the Second International Conference on Complex, 2008

A Distributed Approach for Structured Resource Discovery on Grid.
Proceedings of the Second International Conference on Complex, 2008

2006
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006


  Loading...