Sebastian Poeplau
Sebastian Poeplau
PhD student, EURECOM
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
A honeypot for arbitrary malware on USB storage devices
S Poeplau, J Gassen
2012 7th International Conference on Risks and Security of Internet and …, 2012
Symbolic execution with SymCC: Don’t interpret, compile!
S Poeplau, A Francillon
USENIX Security Symposium 2020, 2020
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation
S Poeplau, A Francillon
35th Annual Computer Security Applications Conference (ACSAC 2019), 2019
SoC Security Evaluation: Reflections on Methodology and Tooling
N Corteggiani, G Camurati, M Muench, S Poeplau, A Francillon
IEEE Design & Test, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–6