Follow
Sebastian Poeplau
Sebastian Poeplau
PhD student, EURECOM
Verified email at eurecom.fr - Homepage
Title
Cited by
Cited by
Year
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
4112014
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2082018
Symbolic execution with SymCC: Don’t interpret, compile!
S Poeplau, A Francillon
USENIX Security Symposium 2020, 2020
1912020
SymQEMU: Compilation-based symbolic execution for binaries
S Poeplau, A Francillon
NDSS 2021, 2021
772021
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation
S Poeplau, A Francillon
35th Annual Computer Security Applications Conference (ACSAC 2019), 2019
312019
A honeypot for arbitrary malware on USB storage devices
S Poeplau, J Gassen
2012 7th International Conference on Risks and Security of Internet and …, 2012
212012
SoC Security Evaluation: Reflections on Methodology and Tooling
N Corteggiani, G Camurati, M Muench, S Poeplau, A Francillon
IEEE Design & Test 38 (1), 7-13, 2020
42020
Increasing the performance of symbolic execution by compiling symbolic handling into binaries
S Poeplau
Sorbonne université, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8