Alessio's pic is missing.

Short Bio

  • Born in Savona, Liguria, the 6th of Feb. 1980.
  • Oct. 2003: B.Sc. cum laude in Computer Science at University of Genova.
  • Sept. 2005: M.Sc. cum laude in Computer Science at University of Genova.
  • From Dec. 2006 to Jan. 2010: research grants at IEIIT-CNR, Branch of Genova.
  • Apr. 2010: Ph.D. in Computer Science at University of Genova on HPC and Grid technologies.
  • From Feb. 2010 to Mar. 2011: PostDoc in Computer Security at AI-Lab, DIST, University of Genova.
  • From Apr. 2011 to Aug. 2014: Assistant Professor at E-Campus University and Associate Researcher at AI-Lab, DIBRIS, University of Genova.
  • From Sep. 2014 to Aug. 2017: Assistant Professor at DIBRIS, University of Genova.
  • Apr. 2017: Habilitation as “Associate Professor” both in Computer Engineering (S.C. 09/H1) and in Computer Science (S.C. 01/B1), according to the Italian National Scientific Habilitation Procedure (ASN 2016-2018).
  • July 2018: Habilitation as “Full Professor” in Computer Engineering (S.C. 09/H1), according to the Italian National Scientific Habilitation Procedure (ASN 2016-2018).

Current positions

  • Associate Professor at DIBRIS, University of Genova (since Oct. 2017).
  • Founder and C.T.O. at Talos s.r.l.s (since Jan. 2016).

Publications

Books

  • A. Merlo, M. Migliardi, S. Al-Haj Baddar (Eds.). “Adaptive Mobile Computing: Advances in Processing of Mobile Data Sets” Elsevier. ISBN: 9780128046036. Expected release: 2017, 2Q.
  • L. Caviglione, M. Coccoli, A. Merlo (Eds.). “Social Network Engineering for Secure Web Data and Services”. DOI: 10.4018/978-1-4666-3926-3, IGI-Global.

International Journals

  • S. Aonzo, G. C. Georghiu, L. Verderame, A. Merlo. “Obfuscapk: an open-source black-box obfuscation tool for Android apps”, in SoftwareX, Elsevier. DOI: 10.1016/j.softx.2020.100403.
  • D. Caputo, L. Verderame, A. Ranieri, A. Merlo, L. Caviglione. “Fine-hearing Google Home: why silence will not protect your privacy”, in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. DOI: 10.22667/JOWUA.2020.03.31.035
  • M. Guerar, M. Migliardi, L. Verderame, F. Palmieri, A. Merlo. “A Fraud-resilient, Blockchain-based Solution for Invoice Financing”, in IEEE Transactions on Engineering Management. DOI: 10.1109/TEM.2020.2971865.
  • G. Guerar, L. Verderame, A. Merlo, F. Palmieri, M. Migliardi, L. Vallerini. “CirclePIN: a novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices”, in ACM Transactions on Cyber-Physical Systems. DOI: 10.1145/3365995.
  • L. Verderame, I. Merelli, L. Morganti, E. Corni, D. Cesini, D. D’Agostino, A. Merlo. “A Secure Cloud-Edge Computing Architecture for Metagenomics Analysis”, in Future Generation Computer Systems, DOI: 10.1016/j.future.2019.09.013.
  • M. Guerar, M. Migliardi, F. Palmieri, L. Verderame, A. Merlo. “Securing PIN-based Authentication in Smartwatches With just Two Gestures”, in Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.5549.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “Behavioral Anomaly Detection in Forensics Analysis”, IEEE Security & Privacy, pp. 55-62, Vol 17(1), 2019. DOI: 10.1109/MSEC.2019.2894917.
  • S. Limet, A. Merlo, L. Spalazzi. “HPC & Co.: Where are distributed paradigms heading toward?”, Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.4431
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi, F. Palmieri. “Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition”, Computers and Security, DOI: 10.1016/j.cose.2017.12.003
  • S. Aonzo, A. Merlo, M. Migliardi, L. Oneto, F. Palmieri. “Low-Resource Footprint, Data-driven Malware Detection on Android”, IEEE Trans. on Sustainable Computing, Vol. PP, no. 99, pp. 1-1, DOI: 10.1109/TSUSC.2017.2774184.
  • M. Guerar, A. Merlo, M. Migliardi. “ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks”, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 5(2), pp. 64-78, DOI:10.22667/JOWUA.2017.06.31.064.
  • M. Guerar, A. Merlo, M. Migliardi. “Completely Automated Public Physical test to tell Computers and Humans Apart: A Usability Study on Mobile Devices”. Future Generation Computer Systems, Elsevier (to appear). DOI: 10.1016/j.future.2017.03.012.
  • M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, F. Palmieri, A. Castiglione. “Using Screen Brightness to Improve Security in Mobile Social Network Access”, IEEE Trans. on Dependable and Secure Computing. DOI: 10.1109/TDSC.2016.2601603.
  • G. Costa, A. Merlo, L. Verderame, A. Armando. “Automatic Security Verification of Mobile App Configurations”, Future Generation Computer Systems, Elsevier. DOI: 10.1016/j.future.2016.06.014.
  • A. Merlo, M. Migliardi, E. Spadacini. “IPS-Based Reduction of Network Energy Consumption”, Logic Journal of the IGPL, Oxford Press. DOI: 10.1093/jigpal/jzw053.
  • A. Merlo, G. Costa, L. Verderame, A. Armando. “Android vs. SEAndroid: an Empirical Assessment”, Pervasive & Mobile Computing, Vol. 30, pp. 113-131, Elsevier. DOI: 10.1016/j.pmcj.2016.01.006.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “Generating Statistical Insights into Network Behavior Using SKETURE”, Journal of High Speed Networks, Vol. 22, N. 1, pp. 65-76, IoS Press. DOI: 10.3233/JHS-160539.
  • A. Merlo, M. Migliardi, P. Fontanelli. “Measuring and Estimating Power Consumption in Android to Support Energy-based Intrusion Detection”, Journal of Computer Security, 23(5):611-637, IoS Press. DOI: 10.3233/JCS-150530.
  • A. Merlo, M. Migliardi, L. Caviglione. “A Survey on Energy-Aware Security Mechanisms”, Pervasive & Mobile Computing, Vol. 24, pp. 77-90, Dec. 2015, Elsevier. DOI:10.1016/j.pmcj.2015.05.005.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Modeling and Enforcing Bring Your Own Device Policies”, International Journal of Information Security, (2015) 14(2):123-140, Springer, DOI: 10.1007/s10207-014-0252-y.
  • A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, A. Merlo. “Mobile App Security Analysis with the MAVeriC Static Analysis Module”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):103-119, DOI:10.22667/JOWUA.2014.12.31.103.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “Anomaly Detection in Computer Networks: A State of-the-Art Review”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):29-64, DOI:10.22667/JOWUA.2014.12.31.029.
  • A. Armando, A. Merlo, L. Verderame. “Security considerations related to the use of mobile devices in the operation of critical infrastructures”, International Journal of Critical Infrastructure Protection, (2015) 7(4):247-256, Elsevier, DOI: 10.1016/j.ijcip.2014.10.002.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Securing the Bring Your Own Device Paradigm”, IEEE Computer, (2014) 47(6):26-34. DOI: 10.1109/MC.2014.164.
  • A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, A. Castiglione. “A Denial of Service Attack to UMTS Networks Using SIM-less Devices”, IEEE Transactions on Dependable and Secure Computing, (2014) 11(3):280–291, DOI: 10.1109/TDSC.2014.2315198. Featured Article at IEEE CyberSecurity Initiative, 2015.
  • L. Caviglione, M. Coccoli, A. Merlo. “A Taxonomy-based Model of Security and Privacy in Online Social Networks”, International Journal of Computational Science and Engineering, (2014) 49(4):325-338, Inderscience, DOI: 10.1504/IJCSE.2014.060717.
  • A. Armando, A. Merlo, M. Migliardi, L. Verderame. “Breaking and Fixing the Android Launching Flow”, Computer & Security, (2013) 39A:104-115, Elsevier, DOI: 10.1016/j.cose.2013.03.009.
  • M. Migliardi, A. Merlo. “Improving Energy Efficiency in Distributed Intrusion Detection Systems”, Journal of High Speed Networks, (2013) 19(3):251-264, IoS Press, DOI: 10.3233/JHS-130476.
  • A. Merlo. “Secure Cooperative Access Control on Grid”, Future Generation Computer Systems, (2013) 29(2):497–508, Elsevier. DOI: 10.1016/j.future.2012.08.001.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Securing the Bring Your Own Device Policy”, Journal of Internet Services and Information Security (2012), 2(3):3-16. Best Paper Award at MIST 2012.
  • L. Caviglione, A. Merlo, M. Migliardi. “Green-Aware Security: Towards a new Research Field”, Journal of Information Assurance and Security, (2012) 7(7):338-346, Dynamic Publishers Inc., USA.
  • L. Caviglione, A. Merlo. “The Energy Impact of Security Mechanisms in Modern Mobile Devices”, Network Security, 2012(2):11-14, Elsevier. DOI : 10.1016/S1353-4858(12)70015-6.
  • M. Aiello, A. Merlo, G. Papaleo. “Performance Assessment of DNS Tunneling Tools”, Logic Journal of the IGPL, (2012) 21(4):592-602, Oxford Journals. DOI: 10.1093/jigpal/jzs029.
  • A. Merlo. “A Cooperative Model for Resource Sharing on Grid”, Journal of Information Assurance and Security, (2011) 6(1):106-114, Dynamic Publishers Inc., USA.
  • A. Merlo, A. Clematis, A. Corana, V. Gianuzzi. “Quality of Service on Grid: architectural and methodological issues”, * Concurrency and Computation: Practice and Experience*, (2011) 23(8):745-766,Wiley, DOI: 10.1002/cpe.1641.
  • V. Gianuzzi, D. D’Agostino, A. Merlo, A. Clematis. “Efficient management of resources and entities using the HyVonNe P2P architecture”, International Journal of Grid and Utility Computing, (2009) 1(3):216-226, DOI: 10.1504/IJGUC.2009.027649.

Book Chapters

  • L. Caviglione, M. Coccoli, A. Merlo. “A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks”, in Social Network Engineering for Secure Web Data and Services, pp. 184-205, IGI-Global. DOI: 10.4018/978-1-4666-3926-3.ch009.
  • L. Caviglione, M. Coccoli, A. Merlo. “On Social Network Engineering for Secure Web Data and Services”, in Social Network Engineering for Secure Web Data and Services, pp. 1-4, IGI Global. DOI: 10.4018/978-1-4666-3926-3.ch001.
  • L. Caviglione, A. Merlo. “Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications”, in Handbook of Green Information and Communication Systems, pp. 589-610, Wiley. DOI: 10.1016/B978-0-12-415844-3.00023-1.
  • A. Merlo, A. Corana, V. Gianuzzi, A. Clematis. “SoRTSim: A high-level simulator for the evaluation of QoS models on Grid”, Remote Instrumentation for eScience and Related Aspects, Springer, pp. 161-176, Springer, ISBN 978-1-4614-0507-8, DOI: 10.1007/978-1-4614-0508-5_11.
  • A. Merlo, D. D’Agostino, V. Gianuzzi, A. Clematis, A. Corana. “GridWalker: a visual tool for supporting the advanced discovery of Grid resources”, in Remote Instrumentation Services in the e-infrastructure, pp. 103-112, Springer, ISBN 978-1-4419-5573-9, DOI: 10.1007/978-1-4419-5574-6_8.
  • A. Merlo, A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Quarati, “SoRTGrid: a Grid framework compliant with Soft Real Time requirements”, in Remote Instrumentation and Virtual Laboratories: Service Architecture and Networking, pp. 145-161, Springer, ISBN 978-1-4419-5595-1, DOI: 10.1007/978-1-4419-5597-5_13.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, “Grid services for 3D data analysis in Virtual Laboratories”, in Grid Enabled Remote Instrumentation, pp. 481-498, Springer, ISBN 978-0-387-09662-9, DOI: 10.1007/978-0-387-09663-6_32.

International Conference Proceedings

  • A. Mantovani, S. Aonzo, X. Ugarte-Pedrero, A. Merlo, D. Balzarotti. “Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem” in Proc. of the Network and Distributed System Security Symposium (NDSS 2020)
  • N. Dejon, D Caputo, L. Verderame, A. Armando, A. Merlo. “Automated Security Analysis of IoT Software Updates”, in Proc. of the IFIP International Conference on Information Security Theory and Practice (WISTP 2019)
  • D. Caputo, L. Verderame, S. Aonzo, A. Merlo. “Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps”, in Proc. of the IFIP Annual Conference on Data and Applications Security and Privacy 2019 (DBSec 2019), Charleston, South Carolina, USA.
  • M. Guerar, L. Verderame, M. Migliardi, A. Merlo. “2GesturePIN: Securing PIN-based Authenticationon Smartwatches”, in Proc. of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2019), Capri, Italy.
  • E. Russo, L. Verderame, A. Merlo. “Towards Policy-driven Monitoring of Fog Applications”, in Proc. of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2019), Capri, Italy.
  • M. Guerar, L. Verderame, A. Merlo, M. Migliardi. “Blockchain-based risk mitigation for invoice financing”. Proc. of the 23rd International Database Engineering & Applications Symposium (IDEAS 2019), Athens, Greece.
  • L. Caviglione, A. Merlo, M. Migliardi. “Covert Channels in IoT Deployments Through Data Hiding Techniques”. Proc. of 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2018) Krakov, Poland.
  • S. Aonzo, A. Merlo, G. Tavella, Y. Fratantonio. “Phishing Attacks on Modern Android”. Proc. of the ACM Conference on Computer and Communications Security 2018 (ACM CCS 2018), Toronto, Canada.
  • V. Conti, S. Sante Ruffo, A. Merlo, M. Migliardi, S. Vitabile. “A Bio-inspired Approach to Attack Graphs Analysis”, in Proc. of the 10th Int. Symposium on Cyberspace Safety and Security, (CSS 2018], Amalfi, Italy.
  • D. Pedrini, M. Migliardi, C. Ferrari, A. Merlo. “On The Case of Blockchain Adoption in the Internet of Things”, in Proc. of the 12th Int. Conf. on Ubiquitous Compouting and Ambient Intelligence (UCAmI 2018, Punta Cana, Dominican Republic.
  • S. Aonzo, G. Lagorio, A. Merlo. “RmPerm: a Tool for Android Permissions Removal”, in Proc. of the 14th International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain.
  • M. Migliardi, S. Al-Haj Baddar, A. Merlo. “Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications”, in Proc. of the 11th International Conference on Complex, Intelligent and Intensive Software Systems (CISIS 2017), July 10-12, Turin, Italy. DOI: 10.1007/978-3-319-61566-0_96
  • A. Merlo, G. C. Georgiu. “RiskInDroid: Machine Learning-based Risk Analysis on Android”, in Proc. of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2017), Rome, Italy.
  • A. Merlo. “BYODCert: Toward a Cross-Organizational BYOD paradigm”, in Proc. of the 12th International Conference on Green, Pervasive and Cloud Computing (GCP 2017), Cetara, Italy.
  • S. Al Haj Baddar, A. Merlo, M. Migliardi, F. Palmieri. “Dynamic Latency Sensitivity Recognition: an Application to Energy Saving”, in Proc. of the 12th International Conference on Green, Pervasive and Cloud Computing (GCP 2017), Cetara, Italy.
  • A. Merlo, L. Lorrai, L. Verderame. Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices, in Proc. of the 11th International Conference on High Performance Computing Systems (HPCS 2016), pp. 454-459, Innsbruck, Austria. DOI: 10.1109/HPCSim.2016.7568370.
  • G. Costa, P. Gasti, A. Merlo, S.-H. Yu. “FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization”, in Proc. of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), pp. 389-400, Xi’an, China. DOI: 10.1145/2897845.2897887.
  • A. Armando, G. Costa, A. Merlo, L. Verderame, K. Wrona. “Developing the NATO BYOD Security Policy”, in Proc. of the 15th International Conference on Military Communications and Information Systems (ICMCIS 2016), pp. 1-6, Brussels, Belgium. DOI: 10.1109/ICMCIS.2016.7496587.
  • A. Merlo, M. Migliardi, E. Spadacini. “Balancing Delays and Energy Consumption in IPS-Enabled Networks”, in Proc. of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA 2016), pp. 267-272, Crans-Montana, Switzerland. DOI: 10.1109/WAINA.2016.109.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “SKETURE: A Sketch-based Packet Analysis tool”, in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 67–70, Denver, USA. DOI: 10.1145/2808783.2808791.
  • A. Armando, G. Bocci, G. Costa, R. Mammoliti, A. Merlo, S. Ranise, R. Traverso, A. Valenza. “Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module”, in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 41–49, Denver, USA. DOI: 10.1145/2808783.2808786.
  • M. Migliardi, A. Merlo, A. Passaglia. “On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation”, in Proc. of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015) , Krakow, Poland. DOI: 10.1109/3PGCIC.2015.53.
  • A. Armando, R. Carbone, G. Costa, A. Merlo. “Android Permissions Unleashed”, in Proc. of the 28th IEEE Computer Security Foundations Symposium (CSF 2015), IEEE. DOI: 10.1109/CSF.2015.29.
  • A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, and A. Merlo. “SAM: the Static Analysis Module of the MAVERIC Mobile App Security Verification Platform”, in Proc. of 2015 European Joint Conferences on Theory and Practice of Software (ETAPS 2015), LNCS Vol. 9035, 2015, pp 225-230, Springer, DOI: 10.1007/978-3-662-46681-0_19.
  • A. Armando, A. Merlo, L. Verderame. “Trusted Host-Based Card Emulation”, in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237043.
  • M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, B. Messabih. “A Completely Automatic Public Physical test to tell Computers and Humans Apart: a way to enhance authentication schemes in mobile devices”, in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237041.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Enabling BYOD through Secure Meta-Market”, in Proc. of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 219-230, ACM NY, DOI: 10.1145/2627393.2627410.
  • A. Merlo, M. Migliardi, P. Fontanelli. “On Energy-Based Profiling of Malware in Android”, in Proc. of the 9th International Conference on High Performance Computing Systems (HPCS 2014), pp. 535-542, IEEE, DOI: 10.1109/HPCSim.2014.6903732.
  • A. Merlo, M. Migliardi, D. Raso, E. Spadacini. “Optimizing Network Energy Consumption through Intrusion Prevention Systems”, in Proc. of the 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2014), AISC, Vol. 299, 2014, pp. 505-515, Springer, DOI: 10.1007/978-3-319-07995-0_50.
  • M. Migliardi, A. Merlo, L. Caviglione. “A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing”, in Proc. of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), pp. 241-246, IEEE, DOI: 10.1109/IMIS.2014.30.
  • M. Migliardi, A. Merlo, M. Tettamanti. “Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm”, in Proc. of 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), pp. 575-580, IEEE, DOI: e10.1109/INCoS.2014.47.
  • M. Migliardi, A. Merlo. “Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches”, in Proc. of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA 2013), pp. 1547-1552, IEEE, DOI: 10.1109/WAINA.2013.214. Best Paper Award.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Bring Your Own Device, Securely”, in Proc. of the 28th ACM Symposium on Applied Computing (SAC 2013), Vol. 2, pp. 1852-1858, ACM, DOI: 10.1145/2480362.2480707.
  • A. Armando, A. Merlo, L. Verderame. “An Empirical Evaluation of the Android Security Framework”, in Proc. of the 28th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2013), LNCS, Vol. 405, pp. 176-189, Springer, DOI: 10.1007/978-3-642-39218-4_14.
  • N. Gobbo, A. Merlo, M. Migliardi. “A Denial of Service attack to GSM networks via attach procedure, in *Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013), LNCS, Vol. 8128, pp. 361-376, Springer, DOI: 10.1007/978-3-642-40588-4_25.
  • M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse. “Towards Energy-Aware Intrusion Detection Systems on Mobile Devices”, in Proc. of the 8th International Conference on High Performance Computing Systems (HPCS 2013), pp. 289-296, IEEE, DOI: 10.1109/HPCSim.2013.6641428.
  • A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, I. You. “Trustworthy Opportunistic Access to the Internet of Services”, in Proc. of the 1st Information and Communication Technology Eurasia Conference (EurAsia 2013), LNCS, Vol. 7804, 2013, pp. 469-478, Springer, DOI: 10.1007/978-3-642-36818-9_52.
  • A. Armando, A. Merlo, A. Migliardi, L. Verderame. “Would you mind forking this process? A Denial-of-Service attack on Android (and some countermeasures)”, in Proc. of the 27th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2012), LNCS IFIP AICT n.376, pp. 13-24, Springer, DOI: 10.1007/978-3-642-30436-1_2. Best Paper Award.
  • A. Armando, G. Costa, A. Merlo. “Formal Modeling and Reasoning about the Android Security Framework”, in Proc. of the 7th International Symposium on Trustworthy Global Computing (TGC 2012), LNCS Vol. 8191, 2013, pp 64-81, Springer. DOI: 10.1007/978-3-642-41157-1_5.
  • A. Armando, G. Pellegrino, R. Carbone, A. Merlo, D. Balzarotti. “From Model-checking to Automated Testing of Security Protocols: Bridging the Gap”, in Proc. of the 6th International Conference on Tests & Proofs (TAP 2012), LNCS Vol. 7305, 2012, pp 3-18, Springer, DOI: 10.1007/978-3-642-30473-6_3.
  • A. Armando, R. Carbone, A. Merlo. “Formal Analysis of a Privacy-Preserving Billing Protocol”, in Proc. of the 1st Workshop on Smart Grid Security (SGSec 2012), LNCS 7823, 2013, pp. 108-119, Springer, DOI: 10.1007/978-3-642-38030-3_8.
  • P. Maresca, A. Merlo, M. Arrigoni Neri, L. Stanganelli. “Using ETC framework in virtual laboratories for online students” in Proc. of the 7th Workshop of the Italian Eclipse Community (ECL-IT 2012).
  • L. Caviglione, A. Merlo, M. Migliardi. “What is Green Security?”, in Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), Malacca (Malaysia), pp. 366-371, IEEE. DOI: 10.1109/ISIAS.2011.6122781.
  • P. Gasti, A. Merlo. “On Re-Use of Randomness in Broadcast Encryption”, in Proc. of the 9th IEEE International Conference on Privacy, Security and Trust (PST 2011), Canada, pp. 36-43, IEEE, DOI: 10.1109/PST.2011.5971961.
  • A. Merlo, G. Papaleo, S. Veneziano, M. Aiello, “A Comparative Performance Evaluation of DNS Tunneling Tools”, in Proc. of the 4th International Conference on Computational intelligence in Security for Information Systems (CISIS 2011), LNCS Vol. 6694, 2011, pp. 84-91, Springer, DOI: 10.1007/978-3-642-21323-6_11.
  • M. Migliardi, A. Merlo. “Modeling the energy consumption of a distributed IDS: a step towards Green Security”, in Proc. of the 34th IEEE International Convention on Information and Communication Technology (MiPro 2011), Electronics and Microelectronics, pp. 1452 - 1457, IEEE.
  • P. Gasti, A. Merlo, G. Ciaccio, G. Chiola. “On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks”, in Proc. of the 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), pp.192-197, IEEE, DOI: 10.1109/NCA.2010.34.
  • A. Merlo, A. Armando. “Cooperative Access Control for the Grid” (IAS 2010), in Proc. of the 6th International Conference on Information Assurance and Security, pp. 228-233, IEEE, DOI: 10.1109/ISIAS.2010.5604068.
  • V. Gianuzzi, A. Merlo. “Beaconing support in Publish-Subscribe Middleware for Vehicular Applications”, in Proc. of the 2nd International Workshop on Pervasive Mobile and Embedded Computing (M-MPAC 2010), pp. 1-8, ACM, DOI: 10.1145/1890791.1890795.
  • V. Gianuzzi, A. Merlo, A. Clematis, D. D’Agostino. “Managing Networks of Mobile Entities using the HyVonNe P2P Architecture”, in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 335-341, IEEE, DOI: 10.1109/CISIS.2008.62.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, A. Quarati. “A Distributed Approach for Structured Resource Discovery on Grid”, in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 117-125. IEEE, DOI: 10.1109/CISIS.2008.112.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo. “Resource selection and application execution in a Grid: A migration experience from GT2 to GT4”, in Proc. of the International Conference on Grid computing, high-performAnce and Distributed Applications (GADA 2006), LNCS, n. 4276, pp. 1132-1142, Springer, DOI: 10.1007/11914952_4.

Supervision

PostDoc

Ph.D. Students

  • 2019-2021: Ph.D supervision of Marco Zuppelli (Cycle XXXIV), DIBRIS, University of Genoa.
  • 2019-2021: Ph.D supervision of Andrea Romdhana (Cycle XXXIV), DIBRIS, University of Genoa.
  • 2018-2020: Doctoral Supervisor of Davide Caputo (Cycle XXXIII), DIBRIS, University of Genoa.
  • 2017-2019: Doctoral Supervisor of Simone Aonzo (Cycle XXXII), DIBRIS, University of Genoa.
  • 2013-2016: Doctoral Supervisor of Luca Verderame (Cycle XXVIII), DIBRIS, University of Genoa.

Other info:

Contacts and Full CV