About
21
Publications
8,680
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
363
Citations
Introduction
Meriem Guerar is a senior researcher at CyberTooth research group (Guppo Sigla & CIPI) working on SSI, IoT and blockchain projects. She was involved in multiple European H2020 projects (Truth Seekers Chain, FINSEC, FILANTROPOS) and others in collaboration with Gruppo Sigla S.R.L(TiAMO, PICK-UP) and GFT S.R.L (DLI, OFION). Her main activities include but are not limited to designing secure and usable authentication methods, analysing security of IoT networks, designing and developing Dapp.
Skills and Expertise
Current institution
Publications
Publications (21)
As cloud technology has become increasingly predominant in the last decade, more and more companies have been choosing to migrate to the cloud to leverage its cost-efficient services. Due to the hectic market pace, cloud security is often overlooked, thus leading to critical cyber attacks that can result in severe impacts, e.g., massive data leaks....
The purpose of this work is to leverage two types of sensors, motion and optical, to create a continuous authentication system for smart devices such as smartwatches. The proposed solution is based on an Android application that uses the accelerometer and gyroscope to measure movements and to classify them in normal and session-endangering classes....
Disinformation has become a worrisome phenomenon at a global scale, spreading rapidly thanks to the growth of social media and frequently causing serious harm. For instance, it can perplex and manipulate users, fuel scepticism on crucial issues such as climate change, jeopardize a variety of human rights, such as the right to free and fair election...
A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [100]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of service, etc. Thus, they represent a serious threat to all businesses in general, but are especially...
A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [100]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of service, etc. Thus, they represent a serious threat to all businesses in general, but are especially...
Cellular networks are fundamental infrastructures nowadays, so that any communication problem could affect the user in different ways, from accessing social networks up to personal safety issues. In this work, we explore the feasibility of carrying out a DDoS attack to the Home Subscriber Server of the 4G network through non-3GPP access, i.e. acces...
Invoice financing has been a steadily growing component of the financing market as a whole for the last few years, and, in2016, it became the third-largest financing market. Nonetheless, the risk of frauds is still very acute, and most solutions proposed so far are based on private, proprietary platforms that cannot match the global nature of such...
**To appear in "ACM Transactions on Cyber-Physical Systems".**
In the last months, the market of personal wearable devices is booming significantly, and, in particular, smartwatches are starting to assume a fundamental role in the Bring Your Own Device (BYOD) arena as well as in the more general Internet of Things (IoT)ecosystem, by acting both as...
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to develop sophisticated applications that make daily life easier and more convenient for consumers. The services provided include applications for mobile payment, ticketing, identification, access control, etc. While this makes modern smartwatches very powerful device...
Smartwatches offer new capabilities to develop sophisticated applications that make daily life easier and more convenient for consumers and are becoming increasingly ubiquitous. The kind of services these devices are capable to provide include applications for mobile payment, ticketing, identification, access control, etc. While this makes modern s...
The market for invoice financing has been steadily growing in the last few years and has been the third financing market in size in 2016. Most solutions in this field are based on private platforms and even the new proposals based on blockchain are mostly adopting a private, permissioned blockchain. In this paper, we propose an idea based on a publ...
Smartphone devices are often assuming the role of edge systems in mobile IoT scenarios and the access to cloud-based services through smartphones, for transmitting multiple sensory data related to human activities, often implying some lawful evidence, has become increasingly common. Thus the need for protecting such transactions from abuses and fra...
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms. This approach, however, introduces additional cognitive burdens for users and lowers the whole authentication mechanism acceptability to the point of making it unusable. On the contra...
Pattern lock is a very popular mechanism to secure authenticated access to mobile terminals; this is mainly due to its ease of use and the fact that muscle memory endows it with an extreme memorability. Nonetheless, pattern lock is also very vulnerable to smudge and side channels attacks, thus its actual level of security has been often considered...
In the today’s mobile communications scenario, smartphones offer new capabilities to develop sophisticated applications that seem to make daily life easier and more convenient for users. Such applications, which may involve mobile ticketing, identification, access control operations, etc., are often accessible through social network aggregators, th...
Pattern lock is a very popular mechanism to secure authenticated access to mobile terminals; this is mainly due to its ease of use and the fact that muscle memory endows it with an extreme memora- bility. Nonetheless, pattern lock is also very vulnerable to smudge and side channels attacks, thus its actual level of security has been often considere...
We are witnessing a growing demand for ATM authentication solutions that overcome the limitations of the de facto standard mechanism based on magnetic card and numeric PIN, that has revealed to be weak against ATM-specific attacks (e.g., skimming and recording attacks). An emerging trend is relying on smartphones as a carrier for authentication. Ho...