Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna NDSS 14, 23-26, 2014 | 411 | 2014 |
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers G Camurati, S Poeplau, M Muench, T Hayes, A Francillon Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 208 | 2018 |
Symbolic execution with SymCC: Don’t interpret, compile! S Poeplau, A Francillon USENIX Security Symposium 2020, 2020 | 191 | 2020 |
SymQEMU: Compilation-based symbolic execution for binaries S Poeplau, A Francillon NDSS 2021, 2021 | 77 | 2021 |
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation S Poeplau, A Francillon 35th Annual Computer Security Applications Conference (ACSAC 2019), 2019 | 31 | 2019 |
A honeypot for arbitrary malware on USB storage devices S Poeplau, J Gassen 2012 7th International Conference on Risks and Security of Internet and …, 2012 | 21 | 2012 |
SoC Security Evaluation: Reflections on Methodology and Tooling N Corteggiani, G Camurati, M Muench, S Poeplau, A Francillon IEEE Design & Test 38 (1), 7-13, 2020 | 4 | 2020 |
Increasing the performance of symbolic execution by compiling symbolic handling into binaries S Poeplau Sorbonne université, 2020 | | 2020 |