Follow
Ali Abbasi
Ali Abbasi
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
IJON: Exploring Deep State Spaces via Fuzzing
C Aschermann, S Schumilo, A Abbasi, T Holz
IEEE Symposium on Security and Privacy (Oakland), 2020
1282020
GRIMOIRE: Synthesizing Structure while Fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1102019
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack
A Abbasi, M Hashemi
Black Hat Europe, 1-35, 2016
882016
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2597-2614, 2021
802021
Challenges in designing exploit mitigations for deeply embedded systems
A Abbasi, J Wetzels, T Holz, S Etalle
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019
602019
On the significance of process comprehension for conducting targeted ICS attacks
B Green, M Krotofil, A Abbasi
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
592017
Nyx-net: network fuzzing with incremental snapshots
S Schumilo, C Aschermann, A Jemmett, A Abbasi, T Holz
Proceedings of the Seventeenth European Conference on Computer Systems, 166-180, 2022
562022
Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing
T Scharnowski, N Bars, M Schloegel, E Gustafson, M Muench, G Vigna, ...
31st USENIX Security Symposium (USENIX Security 22), 1239-1256, 2022
552022
ECFI: Asynchronous control flow integrity for programmable logic controllers
A Abbasi, T Holz, E Zambon, S Etalle
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
552017
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium, 2020
522020
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
Network and Distributed System Security Symposium (NDSS), 2020
432020
ANTIFUZZ: impeding fuzzing audits of binary executables
E Güler, C Aschermann, A Abbasi, T Holz
28th USENIX Security Symposium (USENIX Security 19), 1931-1947, 2019
362019
On emulation-based network intrusion detection systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
International Conference on Recent Advances in Intrusion Detection, 384-404, 2014
292014
Loki: Hardening code obfuscation against automated attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022
232022
Stealth low-level manipulation of programmable logic controllers i/o by pin control exploitation
A Abbasi, M Hashemi, E Zambon, S Etalle
Critical Information Infrastructures Security: 11th International Conference …, 2017
152017
Space odyssey: An experimental software security analysis of satellites
J Willbold, M Schloegel, M Vögele, M Gerhardt, T Holz, A Abbasi
2023 IEEE Symposium on Security and Privacy (SP), 1-19, 2023
142023
Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O
A Abbasi
Centre for Telematics and Information Technology (CTIT), 2016
142016
Technical Report: Hardening Code Obfuscation Against Automated Attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
arXiv preprint arXiv:2106.08913, 2021
112021
Doors of Durin: the Veiled Gate to Siemens S7 Silicon
A Abbasi, T Scharnowski
Black Hat Europe, 2019
102019
A gray-box DPDA-based intrusion detection technique using system-call monitoring
JH Jafarian, A Abbasi, SS Sheikhabadi
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20