Homepage of Alessio Merlo

Alessio's pic is missing.

Short Bio

Current positions

Publications

Google Scholar - Scopus - DBLP - Semantic Scholar

Books

  1. A. Merlo, M. Migliardi, S. Al-Haj Baddar (Eds.). "Adaptive Mobile Computing: Advances in Processing of Mobile Data Sets" Elsevier. Expected release: 2017, 1Q.
  2. L. Caviglione, M. Coccoli, A. Merlo (Eds.). "Social Network Engineering for Secure Web Data and Services". DOI: 10.4018/978-1-4666-3926-3, IGI-Global.

International Journals

  1. M. Guerar, A. Merlo, M. Migliardi. "Completely Automated Public Physical test to tell Computers and Humans Apart: A Usability Study on Mobile Devices". Future Generation Computer Systems, Elsevier (to appear).
  2. M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, F. Palmieri, A. Castiglione. "Using Screen Brightness to Improve Security in Mobile Social Network Access", IEEE Trans. on Dependable and Secure Computing. DOI: 10.1109/TDSC.2016.2601603.
  3. G. Costa, A. Merlo, L. Verderame, A. Armando. "Automatic Security Verification of Mobile App Configurations", Future Generation Computer Systems, Elsevier. DOI: 10.1016/j.future.2016.06.014.
  4. A. Merlo, M. Migliardi, E. Spadacini. "IPS-Based Reduction of Network Energy Consumption", Logic Journal of the IGPL, Oxford Press. DOI: 10.1093/jigpal/jzw053.
  5. A. Merlo, G. Costa, L. Verderame, A. Armando. "Android vs. SEAndroid: an Empirical Assessment", Pervasive & Mobile Computing, Vol. 30, pp. 113-131, Elsevier. DOI: 10.1016/j.pmcj.2016.01.006.
  6. S. Al-Haj Baddar, A. Merlo, M. Migliardi. "Generating Statistical Insights into Network Behavior Using SKETURE", Journal of High Speed Networks, Vol. 22, N. 1, pp. 65-76, IoS Press. DOI: 10.3233/JHS-160539.
  7. A. Merlo, M. Migliardi, P. Fontanelli. "Measuring and Estimating Power Consumption in Android to Support Energy-based Intrusion Detection", Journal of Computer Security, 23(5):611-637, IoS Press. DOI: 10.3233/JCS-150530.
  8. A. Merlo, M. Migliardi, L. Caviglione. "A Survey on Energy-Aware Security Mechanisms", Pervasive & Mobile Computing, Vol. 24, pp. 77-90, Dec. 2015, Elsevier. DOI:10.1016/j.pmcj.2015.05.005.
  9. A. Armando, G. Costa, A. Merlo, L. Verderame. "Modeling and Enforcing Bring Your Own Device Policies", International Journal of Information Security, (2015) 14(2):123-140, Springer, DOI: 10.1007/s10207-014-0252-y.
  10. A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, A. Merlo. "Mobile App Security Analysis with the MAVeriC Static Analysis Module", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):103-119.
  11. S. Al-Haj Baddar, A. Merlo, M. Migliardi. "Anomaly Detection in Computer Networks: A State of-the-Art Review", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):29-64.
  12. A. Armando, A. Merlo, L. Verderame. "Security considerations related to the use of mobile devices in the operation of critical infrastructures", International Journal of Critical Infrastructure Protection, (2015) 7(4):247-256, Elsevier, DOI: 10.1016/j.ijcip.2014.10.002.
  13. A. Armando, G. Costa, A. Merlo, L. Verderame. "Securing the Bring Your Own Device Paradigm", IEEE Computer, (2014) 47(6):26-34. DOI: 10.1109/MC.2014.164.
  14. A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, A. Castiglione. "A Denial of Service Attack to UMTS Networks Using SIM-less Devices", IEEE Transactions on Dependable and Secure Computing, (2014) 11(3):280–291, DOI: 10.1109/TDSC.2014.2315198. Featured Article at IEEE CyberSecurity Initiative, 2015.
  15. L. Caviglione, M. Coccoli, A. Merlo. "A Taxonomy-based Model of Security and Privacy in Online Social Networks", International Journal of Computational Science and Engineering, (2014) 49(4):325-338, Inderscience, DOI: 10.1504/IJCSE.2014.060717.
  16. A. Armando, A. Merlo, M. Migliardi, L. Verderame. "Breaking and Fixing the Android Launching Flow", Computer & Security, (2013) 39A:104-115, Elsevier, DOI: 10.1016/j.cose.2013.03.009.
  17. M. Migliardi, A. Merlo. "Improving Energy Efficiency in Distributed Intrusion Detection Systems", Journal of High Speed Networks, (2013) 19(3):251-264, IoS Press, DOI: 10.3233/JHS-130476.
  18. A. Merlo. "Secure Cooperative Access Control on Grid", Future Generation Computer Systems, (2013) 29(2):497–508, Elsevier. DOI: 10.1016/j.future.2012.08.001.
  19. A. Armando, G. Costa, A. Merlo, L. Verderame. "Securing the Bring Your Own Device Policy", Journal of Internet Services and Information Security (2012), 2(3):3-16. Best Paper Award at MIST 2012.
  20. L. Caviglione, A. Merlo, M. Migliardi. "Green-Aware Security: Towards a new Research Field", Journal of Information Assurance and Security, (2012) 7(7):338-346, Dynamic Publishers Inc., USA.
  21. L. Caviglione, A. Merlo. "The Energy Impact of Security Mechanisms in Modern Mobile Devices", Network Security, 2012(2):11-14, Elsevier. DOI : 10.1016/S1353-4858(12)70015-6.
  22. M. Aiello, A. Merlo, G. Papaleo. "Performance Assessment of DNS Tunneling Tools", Logic Journal of the IGPL, (2012) 21(4):592-602, Oxford Journals. DOI: 10.1093/jigpal/jzs029.
  23. A. Merlo. "A Cooperative Model for Resource Sharing on Grid", Journal of Information Assurance and Security, (2011) 6(1):106-114, Dynamic Publishers Inc., USA.
  24. A. Merlo, A. Clematis, A. Corana, V. Gianuzzi. "Quality of Service on Grid: architectural and methodological issues", * Concurrency and Computation: Practice and Experience*, (2011) 23(8):745-766,Wiley, DOI: 10.1002/cpe.1641.
  25. V. Gianuzzi, D. D’Agostino, A. Merlo, A. Clematis. "Efficient management of resources and entities using the HyVonNe P2P architecture", International Journal of Grid and Utility Computing, (2009) 1(3):216-226, DOI: 10.1504/IJGUC.2009.027649.

Book Chapters

  1. L. Caviglione, M. Coccoli, A. Merlo. "A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks", in Social Network Engineering for Secure Web Data and Services, pp. 184-205, IGI-Global. DOI: 10.4018/978-1-4666-3926-3.ch009.
  2. L. Caviglione, M. Coccoli, A. Merlo. "On Social Network Engineering for Secure Web Data and Services", in Social Network Engineering for Secure Web Data and Services, pp. 1-4, IGI Global. DOI: 10.4018/978-1-4666-3926-3.ch001.
  3. L. Caviglione, A. Merlo. "Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications", in Handbook of Green Information and Communication Systems, pp. 589-610, Wiley. DOI: 10.1016/B978-0-12-415844-3.00023-1.
  4. A. Merlo, A. Corana, V. Gianuzzi, A. Clematis. "SoRTSim: A high-level simulator for the evaluation of QoS models on Grid", Remote Instrumentation for eScience and Related Aspects, Springer, pp. 161-176, Springer, ISBN 978-1-4614-0507-8, DOI: 10.1007/978-1-4614-0508-5_11.
  5. A. Merlo, D. D’Agostino, V. Gianuzzi, A. Clematis, A. Corana. "GridWalker: a visual tool for supporting the advanced discovery of Grid resources", in Remote Instrumentation Services in the e-infrastructure, pp. 103-112, Springer, ISBN 978-1-4419-5573-9, DOI: 10.1007/978-1-4419-5574-6_8.
  6. A. Merlo, A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Quarati, SoRTGrid: a Grid framework compliant with Soft Real Time requirements, in Remote Instrumentation and Virtual Laboratories: Service Architecture and Networking, pp. 145-161, Springer, ISBN 978-1-4419-5595-1, DOI: 10.1007/978-1-4419-5597-5_13.
  7. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, Grid services for 3D data analysis in Virtual Laboratories, in Grid Enabled Remote Instrumentation, pp. 481-498, Springer, ISBN 978-0-387-09662-9, DOI: 10.1007/978-0-387-09663-6_32.

International Conference Proceedings

  1. A. Merlo, L. Lorrai, L. Verderame. Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices, in Proc. of the 11th International Conference on High Performance Computing Systems (HPCS 2016), pp. 454-459, Innsbruck, Austria. DOI: 10.1109/HPCSim.2016.7568370.
  2. G. Costa, P. Gasti, A. Merlo, S.-H. Yu. "FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization", in Proc. of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), pp. 389-400, Xi’an, China. DOI: 10.1145/2897845.2897887.
  3. A. Armando, G. Costa, A. Merlo, L. Verderame, K. Wrona. "Developing the NATO BYOD Security Policy", in Proc. of the 15th International Conference on Military Communications and Information Systems (ICMCIS 2016), pp. 1-6, Brussels, Belgium. DOI: 10.1109/ICMCIS.2016.7496587.
  4. A. Merlo, M. Migliardi, E. Spadacini. "Balancing Delays and Energy Consumption in IPS-Enabled Networks", in Proc. of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA 2016), pp. 267-272, Crans-Montana, Switzerland. DOI: 10.1109/WAINA.2016.109.
  5. S. Al-Haj Baddar, A. Merlo, M. Migliardi. "SKETURE: A Sketch-based Packet Analysis tool", in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 67–70, Denver, USA. DOI: 10.1145/2808783.2808791.
  6. A. Armando, G. Bocci, G. Costa, R. Mammoliti, A. Merlo, S. Ranise, R. Traverso, A. Valenza. "Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module", in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 41–49, Denver, USA. DOI: 10.1145/2808783.2808786.
  7. M. Migliardi, A. Merlo, A. Passaglia. "On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation", in Proc. of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015) , Krakow, Poland. DOI: 10.1109/3PGCIC.2015.53.
  8. A. Armando, R. Carbone, G. Costa, A. Merlo. "Android Permissions Unleashed", in Proc. of the 28th IEEE Computer Security Foundations Symposium (CSF 2015), IEEE. DOI: 10.1109/CSF.2015.29.
  9. A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, and A. Merlo. "SAM: the Static Analysis Module of the MAVERIC Mobile App Security Verification Platform", in Proc. of 2015 European Joint Conferences on Theory and Practice of Software (ETAPS 2015), LNCS Vol. 9035, 2015, pp 225-230, Springer, DOI: 10.1007/978-3-662-46681-0_19.
  10. A. Armando, A. Merlo, L. Verderame. "Trusted Host-Based Card Emulation", in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237043.
  11. M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, B. Messabih. "A Completely Automatic Public Physical test to tell Computers and Humans Apart: a way to enhance authentication schemes in mobile devices", in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237041.
  12. A. Armando, G. Costa, A. Merlo, L. Verderame. "Enabling BYOD through Secure Meta-Market", in Proc. of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 219-230, ACM NY, DOI: 10.1145/2627393.2627410.
  13. A. Merlo, M. Migliardi, P. Fontanelli. "On Energy-Based Profiling of Malware in Android", in Proc. of the 9th International Conference on High Performance Computing Systems (HPCS 2014), pp. 535-542, IEEE, DOI: 10.1109/HPCSim.2014.6903732.
  14. A. Merlo, M. Migliardi, D. Raso, E. Spadacini. "Optimizing Network Energy Consumption through Intrusion Prevention Systems", in Proc. of the 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2014), AISC, Vol. 299, 2014, pp. 505-515, Springer, DOI: 10.1007/978-3-319-07995-0_50.
  15. M. Migliardi, A. Merlo, L. Caviglione. "A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing", in Proc. of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), pp. 241-246, IEEE, DOI: 10.1109/IMIS.2014.30.
  16. M. Migliardi, A. Merlo, M. Tettamanti. "Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm", in Proc. of 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), pp. 575-580, IEEE, DOI: e10.1109/INCoS.2014.47.
  17. M. Migliardi, A. Merlo. "Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches", in Proc. of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA 2013), pp. 1547-1552, IEEE, DOI: 10.1109/WAINA.2013.214. Best Paper Award.
  18. A. Armando, G. Costa, A. Merlo, L. Verderame. "Bring Your Own Device, Securely", in Proc. of the 28th ACM Symposium on Applied Computing (SAC 2013), Vol. 2, pp. 1852-1858, ACM, DOI: 10.1145/2480362.2480707.
  19. A. Armando, A. Merlo, L. Verderame. "An Empirical Evaluation of the Android Security Framework", in Proc. of the 28th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2013), LNCS, Vol. 405, pp. 176-189, Springer, DOI: 10.1007/978-3-642-39218-4_14.
  20. N. Gobbo, A. Merlo, M. Migliardi. "A Denial of Service attack to GSM networks via attach procedure*, in Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013), LNCS, Vol. 8128, pp. 361-376, Springer, DOI: 10.1007/978-3-642-40588-4_25.
  21. M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse. "Towards Energy-Aware Intrusion Detection Systems on Mobile Devices", in Proc. of the 8th International Conference on High Performance Computing Systems (HPCS 2013), pp. 289-296, IEEE, DOI: 10.1109/HPCSim.2013.6641428.
  22. A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, I. You. "Trustworthy Opportunistic Access to the Internet of Services", in Proc. of the 1st Information and Communication Technology Eurasia Conference (EurAsia 2013), LNCS, Vol. 7804, 2013, pp. 469-478, Springer, DOI: 10.1007/978-3-642-36818-9_52.
  23. A. Armando, A. Merlo, A. Migliardi, L. Verderame. "Would you mind forking this process? A Denial-of-Service attack on Android (and some countermeasures)", in Proc. of the 27th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2012), LNCS IFIP AICT n.376, pp. 13-24, Springer, DOI: 10.1007/978-3-642-30436-1_2. Best Paper Award.
  24. A. Armando, G. Costa, A. Merlo. "Formal Modeling and Reasoning about the Android Security Framework", in Proc. of the 7th International Symposium on Trustworthy Global Computing (TGC 2012), LNCS Vol. 8191, 2013, pp 64-81, Springer. DOI: 10.1007/978-3-642-41157-1_5.
  25. A. Armando, G. Pellegrino, R. Carbone, A. Merlo, D. Balzarotti. "From Model-checking to Automated Testing of Security Protocols: Bridging the Gap", in Proc. of the 6th International Conference on Tests & Proofs (TAP 2012), LNCS Vol. 7305, 2012, pp 3-18, Springer, DOI: 10.1007/978-3-642-30473-6_3.
  26. A. Armando, R. Carbone, A. Merlo. "Formal Analysis of a Privacy-Preserving Billing Protocol", in Proc. of the 1st Workshop on Smart Grid Security (SGSec 2012), LNCS 7823, 2013, pp. 108-119, Springer, DOI: 10.1007/978-3-642-38030-3_8.
  27. P. Maresca, A. Merlo, M. Arrigoni Neri, L. Stanganelli. "Using ETC framework in virtual laboratories for online students" in Proc. of the 7th Workshop of the Italian Eclipse Community (ECL-IT 2012).
  28. L. Caviglione, A. Merlo, M. Migliardi. "What is Green Security?", in Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), Malacca (Malaysia), pp. 366-371, IEEE. DOI: 10.1109/ISIAS.2011.6122781.
  29. P. Gasti, A. Merlo. "On Re-Use of Randomness in Broadcast Encryption", in Proc. of the 9th IEEE International Conference on Privacy, Security and Trust (PST 2011), Canada, pp. 36-43, IEEE, DOI: 10.1109/PST.2011.5971961.
  30. A. Merlo, G. Papaleo, S. Veneziano, M. Aiello, "A Comparative Performance Evaluation of DNS Tunneling Tools", in Proc. of the 4th International Conference on Computational intelligence in Security for Information Systems (CISIS 2011), LNCS Vol. 6694, 2011, pp. 84-91, Springer, DOI: 10.1007/978-3-642-21323-6_11.
  31. M. Migliardi, A. Merlo. "Modeling the energy consumption of a distributed IDS: a step towards Green Security", in Proc. of the 34th IEEE International Convention on Information and Communication Technology (MiPro 2011), Electronics and Microelectronics, pp. 1452 - 1457, IEEE.
  32. P. Gasti, A. Merlo, G. Ciaccio, G. Chiola. "On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks", in Proc. of the 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), pp.192-197, IEEE, DOI: 10.1109/NCA.2010.34.
  33. A. Merlo, A. Armando. "Cooperative Access Control for the Grid" (IAS 2010), in Proc. of the 6th International Conference on Information Assurance and Security, pp. 228-233, IEEE, DOI: 10.1109/ISIAS.2010.5604068.
  34. V. Gianuzzi, A. Merlo. "Beaconing support in Publish-Subscribe Middleware for Vehicular Applications", in Proc. of the 2nd International Workshop on Pervasive Mobile and Embedded Computing (M-MPAC 2010), pp. 1-8, ACM, DOI: 10.1145/1890791.1890795.
  35. V. Gianuzzi, A. Merlo, A. Clematis, D. D’Agostino. "Managing Networks of Mobile Entities using the HyVonNe P2P Architecture", in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 335-341, IEEE, DOI: 10.1109/CISIS.2008.62.
  36. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, A. Quarati. "A Distributed Approach for Structured Resource Discovery on Grid", in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 117-125. IEEE, DOI: 10.1109/CISIS.2008.112.
  37. A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo. "Resource selection and application execution in a Grid: A migration experience from GT2 to GT4", in Proc. of the International Conference on Grid computing, high-performAnce and Distributed Applications (GADA 2006), LNCS, n. 4276, pp. 1132-1142, Springer, DOI: 10.1007/11914952_4.

Services to the Profession

Editorial Activity

International Conference Chair

General Chair

Local Chair

Workshop Chair

Track Chair

Session Chair

TCP Membership

Projects and Grants

Teaching Activity

(2014- ) Assistant Professor, DIBRIS, University of Genoa.

Degree Course Taught ECTS From: (a.y.) To: (a.y.) Tot. yrs.
M.Sc. Computer Science Data Privacy 6 2016/17 now 1
B. Eng. Computer Engineering Android Programming 6 2014/15 now 3
Ph.D. Computer Science Mobile Security 3 2014/15 now 3
Postgrad. Diploma in Cyber Security Web Security 3 2014/15 now 3
Undergrad. Diploma in ICT (ITS-ICT) MySQL Programming 6 2014/15 now 3
Undergrad. Diploma in ICT (ITS-ICT) Web Programming 6 2014/15 2014/15 1
Tirocinio Formativo Assistito Found. of Comp. Science 6 2014/15 2014/15 1
Percorsi Abilitativi Speciali Found. of Comp. Science 6 2014/15 2014/15 1

(2014- ) Lecturer, Telecommunication School for Italian Armed Forces, Chiavari, Italy.

Degree Course Taught ECTS From: (a.y.) To: (a.y.) Tot. yrs.
Vocat. Training in ICT Systems ASP.NET Programming 6 2016/17 now 1
Vocat. Training in ICT Systems Java Programming 6 2016/17 now 1
Vocat. Training in ICT Systems Basics of Programming 6 2014/15 now 3
Vocat. Training in ICT Systems C/C++ Programming 6 2014/15 now 3
Vocat. Training in ICT Systems Java Programming 6 2011/12 2014/15 4
Postgrad. Diploma in ICT Systems Computer Security 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Java Programming 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Databases 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Information Systems 6 2013/14 2013/14 1

Ph.D. Supervision

Contacts