Publications

2024

Planta, Ulysse; Rederlechner, Julian; Marra, Gabriele; Abbasi, Ali

Let Me Do It For You: On the Feasibility of Inter-Satellite Friendly Jamming Proceedings Article

In: 2024 Security for Space Systems (3S), pp. 1–6, IEEE 2024.

BibTeX | Tags:

Marra, Gabriele; Planta, Ulysse; Wüstenberg, Philipp; Abbasi, Ali

On the Feasibility of CubeSats Application Sandboxing for Space Missions Proceedings Article

In: 2nd Workshop on the Security of Space and Satellite Systems at NDSS, 2024.

BibTeX | Tags:

López-Morales, Efrén; Planta, Ulysse; Rubio-Medrano, Carlos; Abbasi, Ali; Cardenas, Alvaro A

SoK: Security of Programmable Logic Controllers Proceedings Article

In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 7103–7122, 2024.

BibTeX | Tags:

2023

Willbold, Johannes; Schloegel, Moritz; Vögele, Manuel; Gerhardt, Maximilian; Holz, Thorsten; Abbasi, Ali

Space odyssey: An experimental software security analysis of satellites Best Paper Proceedings Article

In: 2023 IEEE Symposium on Security and Privacy (S&P), pp. 1–19, IEEE 2023.

BibTeX | Tags:

2022

Scharnowski, Tobias; Bars, Nils; Schloegel, Moritz; Gustafson, Eric; Muench, Marius; Vigna, Giovanni; Kruegel, Christopher; Holz, Thorsten; Abbasi, Ali

Fuzzware: Using precise MMIO modeling for effective firmware fuzzing Proceedings Article

In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1239–1256, 2022.

BibTeX | Tags:

Schumilo, Sergej; Aschermann, Cornelius; Jemmett, Andrea; Abbasi, Ali; Holz, Thorsten

Nyx-net: network fuzzing with incremental snapshots Proceedings Article

In: Proceedings of the Seventeenth European Conference on Computer Systems, pp. 166–180, 2022.

BibTeX | Tags:

Schloegel, Moritz; Blazytko, Tim; Contag, Moritz; Aschermann, Cornelius; Basler, Julius; Holz, Thorsten; Abbasi, Ali

Loki: Hardening code obfuscation against automated attacks Proceedings Article

In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3055–3073, 2022.

BibTeX | Tags:

2021

Schloegel, Moritz; Blazytko, Tim; Contag, Moritz; Aschermann, Cornelius; Basler, Julius; Holz, Thorsten; Abbasi, Ali

Technical Report: Hardening Code Obfuscation Against Automated Attacks Journal Article

In: arXiv preprint arXiv:2106.08913, 2021.

BibTeX | Tags:

Schumilo, Sergej; Aschermann, Cornelius; Abbasi, Ali; Wörner, Simon; Holz, Thorsten

Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types Proceedings Article

In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2597–2614, 2021.

BibTeX | Tags:

2020

Blazytko, Tim; Schlögel, Moritz; Aschermann, Cornelius; Abbasi, Ali; Frank, Joel; Wörner, Simon; Holz, Thorsten

AURORA: Statistical Crash Analysis for Automated Root Cause Explanation Proceedings Article

In: 29th USENIX Security Symposium, 2020.

BibTeX | Tags:

Aschermann, Cornelius; Schumilo, Sergej; Abbasi, Ali; Holz, Thorsten

IJON: Exploring Deep State Spaces via Fuzzing Proceedings Article

In: IEEE Symposium on Security and Privacy (Oakland), 2020.

BibTeX | Tags:

Schumilo, Sergej; Aschermann, Cornelius; Abbasi, Ali; Wörner, Simon; Holz, Thorsten

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing Proceedings Article

In: Network and Distributed System Security Symposium (NDSS), 2020.

BibTeX | Tags:

2019

Blazytko, Tim; Bishop, Matt; Aschermann, Cornelius; Cappos, Justin; Schlögel, Moritz; Korshun, Nadia; Abbasi, Ali; Schweighauser, Marco; Schinzel, Sebastian; Schumilo, Sergej; others,

GRIMOIRE: Synthesizing Structure while Fuzzing Proceedings Article

In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1985–2002, 2019.

BibTeX | Tags:

Abbasi, Ali; Scharnowski, Tobias

Doors of Durin: the Veiled Gate to Siemens S7 Silicon Proceedings Article

In: Black Hat Europe, 2019.

BibTeX | Tags:

Güler, Emre; Aschermann, Cornelius; Abbasi, Ali; Holz, Thorsten

ANTIFUZZ: impeding fuzzing audits of binary executables Proceedings Article

In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1931–1947, 2019.

BibTeX | Tags:

Abbasi, Ali; Wetzels, Jos; Holz, Thorsten; Etalle, Sandro

Challenges in designing exploit mitigations for deeply embedded systems Proceedings Article

In: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 31–46, IEEE 2019.

BibTeX | Tags:

2018

Abbasi, A

Race to the bottom: embedded control systems binary security: an industrial control system protection approach PhD Thesis

Eindhoven University of Technology, 2018.

BibTeX | Tags:

Wetzels, Jos; Abbasi, Ali

Dissecting QNX Proceedings Article

In: Proc. Blackhat Briefings, pp. 1–22, 2018.

BibTeX | Tags:

2017

Green, Benjamin; Krotofil, Marina; Abbasi, Ali

On the significance of process comprehension for conducting targeted ICS attacks Proceedings Article

In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 57–67, 2017.

BibTeX | Tags:

Abbasi, Ali; Genuise, Andrea

Ghost in the plc vs ghostbuster: on the feasibility of detecting pin control attack in programmable logic controllers Book Section

In: Ghost in the PLC vs GhostBuster: On the Feasibility of Detecting Pin Control Attack in Programmable Logic Controllers, 2017.

BibTeX | Tags:

Abbasi, Ali; Holz, Thorsten; Zambon, Emmanuele; Etalle, Sandro

ECFI: Asynchronous control flow integrity for programmable logic controllers Proceedings Article

In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 437–448, 2017.

BibTeX | Tags:

Abbasi, Ali; Hashemi, Majid; Zambon, Emmanuele; Etalle, Sandro

Stealth low-level manipulation of programmable logic controllers i/o by pin control exploitation Proceedings Article

In: Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers 11, pp. 1–12, Springer International Publishing 2017.

BibTeX | Tags:

Abbasi, Ali; Wetzels, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems Proceedings Article

In: International Conference on Network and System Security, pp. 694–709, Springer International Publishing Cham 2017.

BibTeX | Tags:

2016

Abbasi, Ali; Hashemi, Majid

Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack Journal Article

In: Black Hat Europe, pp. 1–35, 2016.

BibTeX | Tags:

Abbasi, Ali

Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O Journal Article

In: 2016.

BibTeX | Tags:

2014

Abbasi, Ali; Wetzel, Jos

APTs way: evading Your EBNIDS Proceedings Article

In: Black Hat Europe, pp. 1–87, Black Hat 2014.

BibTeX | Tags:

Abbasi, Ali; Wetzels, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

On emulation-based network intrusion detection systems Proceedings Article

In: International Conference on Recent Advances in Intrusion Detection, pp. 384–404, Springer, Cham 2014.

BibTeX | Tags:

2013

Beresford, Dilloni; Abbasi, Ali Beresford

Project IRUS: multifaceted approach to attacking and defending ICS Proceedings Article

In: SCADA Security Scientific Symposium (S4), 2013.

BibTeX | Tags:

2011

Jafarian, Jafar Haadi; Abbasi, Ali; Sheikhabadi, Siavash Safaei

A gray-box DPDA-based intrusion detection technique using system-call monitoring Proceedings Article

In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 1–12, 2011.

BibTeX | Tags:

0000

Songbai, Sun; Abbasi, Ali; Jianwei, Zhuge; Haixin, Duan

Research on HTML5 Security Journal Article

In: 0000.

BibTeX | Tags:

Morales, Efrén López; Planta, Ulysse; Rubio-Medrano, Carlos; Abbasi, Ali; Cardenas, Alvaro A

SoK: Security of Programmable Logic Controllers Journal Article

In: 0000.

BibTeX | Tags:

Abbasi, Ali

Race to the Bottom: Embedded Control Systems Binary Security Journal Article

In: 0000.

BibTeX | Tags: