关注
Sebastian Poeplau
Sebastian Poeplau
PhD student, EURECOM
在 eurecom.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
S Poeplau, Y Fratantonio, A Bianchi, C Kruegel, G Vigna
NDSS 14, 23-26, 2014
4062014
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1892018
Symbolic execution with SymCC: Don’t interpret, compile!
S Poeplau, A Francillon
USENIX Security Symposium 2020, 2020
1762020
SymQEMU: Compilation-based symbolic execution for binaries
S Poeplau, A Francillon
NDSS 2021, 2021
682021
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation
S Poeplau, A Francillon
35th Annual Computer Security Applications Conference (ACSAC 2019), 2019
282019
A honeypot for arbitrary malware on USB storage devices
S Poeplau, J Gassen
2012 7th International Conference on Risks and Security of Internet and …, 2012
212012
SoC Security Evaluation: Reflections on Methodology and Tooling
N Corteggiani, G Camurati, M Muench, S Poeplau, A Francillon
IEEE Design & Test 38 (1), 7-13, 2020
42020
Increasing the performance of symbolic execution by compiling symbolic handling into binaries
S Poeplau
Sorbonne université, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–8