Sebastian Poeplau
Sebastian Poeplau
PhD student, EURECOM
Verified email at - Homepage
Cited by
Cited by
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Symbolic execution with SymCC: Don’t interpret, compile!
S Poeplau, A Francillon
USENIX Security Symposium 2020, 2020
A honeypot for arbitrary malware on USB storage devices
S Poeplau, J Gassen
2012 7th International Conference on Risks and Security of Internet and …, 2012
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation
S Poeplau, A Francillon
35th Annual Computer Security Applications Conference (ACSAC 2019), 2019
SymQEMU: Compilation-based symbolic execution for binaries
S Poeplau, A Francillon
NDSS 2021, 2021
SoC Security Evaluation: Reflections on Methodology and Tooling
N Corteggiani, G Camurati, M Muench, S Poeplau, A Francillon
IEEE Design & Test, 2020
The system can't perform the operation now. Try again later.
Articles 1–7