EMSEC
Embedded Systems Security Group
The EMSEC group at CISPA Helmholtz Center for Information Security conducts security research across the full system stack, from software to firmware to mission-critical embedded systems. We combine hardware and software security methods to uncover vulnerabilities at every layer.
Research Areas
Our research combines deep technical insights of both firmware and hardware to build novel analysis techniques for previously unknown attack surfaces.
Firmware Security & Fuzzing
Developing scalable approaches to vulnerability discovery through firmware fuzzing via rehosting and advanced testing techniques for embedded systems.
Hardware-Assisted Security
Employing side-channel analysis for system-level introspection and hardware-assisted techniques to enhance embedded system security.
Space & Automotive Systems
Addressing complex attack surfaces in mission-critical real-world environments, including space systems and automotive security research.
Software Security
Researching malware and sanitization in software environments including python packages, and large, widely used software projects.
Our Team
Meet the researchers, engineers, and students who drive innovation in embedded systems security. Our diverse team brings expertise from multiple domains to tackle complex security challenges.
Ali Abbasi
Group Leader
Research Interests
- • Embedded systems security
- • Security of mission-critical real-time software
- • Secure space and automotive systems
- • Side-channel analysis
- • Firmware fuzzing via rehosting
Pansilu Pitigala
Postdoctoral Researcher
Research Interests
- • System security
- • Symbolic execution
- • OS kernel security
- • Trusted Execution Environments (TEEs)
- • Program analysis
Martin Mohl
PhD Student
Research Interests
- • Hypervisor security
- • Embedded systems security
- • Firmware analysis
Meng Wang
PhD Student
Research Interests
- • Bootloader security
- • Memory safety analysis
- • Video hardware acceleration security
- • Differential testing
- • Power side-channel analysis
Pouya Narimani
PhD Student
Research Interests
- • Power side-channel analysis
- • Embedded systems security
- • Side-channel challenges
Ulysse Planta
PhD Student
Research Interests
- • Space systems security
- • Satellite communications
- • Inter-satellite friendly jamming
- • Programmable logic controllers
- • Power side-channel challenges
Daniele Mammone
Visiting Researcher
Research Interests
- • Embedded systems security
- • Security research
- • Firmware fuzzing
Pietro Mazzini
Visiting Researcher
Harald Neumann
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
- • Satellite communications
Julian Rederlechner
Research Assistant
Research Interests
- • Space systems security
- • Satellite communications
- • Inter-satellite protocols
- • Inter-satellite friendly jamming
Kseniia Rogova
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
Lisa Röhl
Research Assistant
Research Interests
- • Embedded systems security
- • System security
Majid Garoosi
Research Assistant
Research Interests
- • Embedded systems security
- • Software Testing
- • System analysis
Okhunjon Sobirjonov
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
Latest Publications
Discover our recent contributions to embedded systems security research.
2026
HoneySat: A Network-based Satellite Honeypot Framework
Efrén López-Morales, Ulysse Planta, Gabriele Marra, Carlos González, Jacob Hopkins, Majid Garoosi, Elías Obreque, Carlos Rubio-Medrano, Ali Abbasi
Abstract
Satellites are the backbone of mission-critical services that enable our modern society to function, for example, GPS. For years, satellites were assumed to be secure because of their indecipherable architectures and the reliance on security by obscurity. However, technological advancements have made these assumptions obsolete, paving the way for potential attacks. Unfortunately, there is no way to collect data on satellite adversarial techniques, hindering the generation of intelligence that leads to the development of countermeasures. In this paper, we present HoneySat, the first high-interaction satellite honeypot framework, capable of convincingly simulating a real-world CubeSat, a type of Small Satellite (SmallSat). To provide evidence of HoneySat’s effectiveness, we surveyed SmallSat operators and deployed HoneySat over the Internet. Our results show that 90% of satellite operators agreed that HoneySat provides a realistic simulation. Additionally, HoneySat successfully deceived adversaries in the wild and collected 22 real-world adversarial interactions. Finally, we performed a hardware-in-the-loop operation where HoneySat successfully communicated with an in-orbit, operational SmallSat mission.
One Small Patch for a File, One Giant Leap for OTA Updates
Rederlechner, Julian, Planta, Ulysse, Abbasi, Ali
Abstract
Over-the-Air (OTA) software updates are essential for satellite security and reliability, yet limited uplink bandwidth and communication windows make them challenging. This work performs the first comparative analysis of bsdiff4, bsdiff6, bsdiff-ra, and HDiffPatch on a dataset representative of satellite software stacks, reconstructing a bsdiff6 implementation to enable bandwidth-efficient OTA updates.
Latest News
Stay updated with our latest research achievements and group activities.
~€1M Euro funding from German Space Agency for Secure Satellite Systems
Our project on satellite systems security has been awarded nearly €1 million in funding from the German Space Agency (DLR).
Anota paper accepted at NDSS 2026
Our paper, titled 'Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization' was accepted at NDSS 2026.
One Small Patch paper accepted at NDSS SpaceSec workshop 2026
Our paper, titled 'One Small Patch for a File, One Giant Leap for OTA Updates' was accepted at the NDSS SpaceSec workshop 2026.
Open Positions
We welcome applications for PhD and Postdoc positions in embedded systems security. For current openings and application details, see our positions page or contact us.