Web Analytics

EMSEC

Embedded Systems Security Group

The EMSEC group at CISPA Helmholtz Center for Information Security conducts cutting-edge research at the intersection of hardware and system security. Our work focuses on hardware-assisted analysis and the protection of mission-critical embedded systems.

Research Areas

Our research combines deep technical insights of both firmware and hardware to build novel analysis techniques for previously unknown attack surfaces.

Firmware Security & Fuzzing

Developing scalable approaches to vulnerability discovery through firmware fuzzing via rehosting and advanced testing techniques for embedded systems.

Hardware-Assisted Security

Employing side-channel analysis for system-level introspection and hardware-assisted techniques to enhance embedded system security.

Space & Automotive Systems

Addressing complex attack surfaces in mission-critical real-world environments, including space systems and automotive security research.

Software Security

Researching malware and sanitization in software environments including python packages, and large, widely used software projects.

Our Team

Meet the researchers, engineers, and students who drive innovation in embedded systems security. Our diverse team brings expertise from multiple domains to tackle complex security challenges.

Ali Abbasi - Group Leader

Ali Abbasi

Group Leader

Research Interests

  • • Embedded systems security
  • • Security of mission-critical real-time software
  • • Secure space and automotive systems
  • • Side-channel analysis
  • • Firmware fuzzing via rehosting
Visit Website →
Ulysse Planta - PhD Student

Ulysse Planta

PhD Student

Research Interests

  • • Space systems security
  • • Satellite communications
  • • Inter-satellite friendly jamming
  • • Programmable logic controllers
  • • Power side-channel challenges
Meng Wang - PhD Student

Meng Wang

PhD Student

Research Interests

  • • Bootloader security
  • • Memory safety analysis
  • • Video hardware acceleration security
  • • Differential testing
  • • Power side-channel analysis
Visit Website →
Pouya Narimani - PhD Student

Pouya Narimani

PhD Student

Research Interests

  • • Power side-channel analysis
  • • Embedded systems security
  • • Side-channel challenges
Martin Mohl - PhD Student

Martin Mohl

PhD Student

Research Interests

  • • Hypervisor security
  • • Embedded systems security
  • • Firmware analysis
Visit Website →
Julian Rederlechner - Research Assistant

Julian Rederlechner

Research Assistant

Research Interests

  • • Space systems security
  • • Satellite communications
  • • Inter-satellite protocols
  • • Inter-satellite friendly jamming
Lisa Röhl - Research Assistant

Lisa Röhl

Research Assistant

Research Interests

  • • Embedded systems security
  • • System security
Majid Garoosi - Research Assistant

Majid Garoosi

Research Assistant

Research Interests

  • • Embedded systems security
  • • Hardware security
  • • System analysis
Okhunjon Sobirjonov - Research Assistant

Okhunjon Sobirjonov

Research Assistant

Research Interests

  • • Embedded systems security
  • • Security research
Kseniia Rogova - Research Assistant

Kseniia Rogova

Research Assistant

Research Interests

  • • Embedded systems security
  • • Security research
Harald Neumann - Research Assistant

Harald Neumann

Research Assistant

Research Interests

  • • Embedded systems security
  • • Security research
Pietro Mazzini - Visiting Researcher

Pietro Mazzini

Visiting Researcher

Research Interests

  • • Embedded systems security
  • • Security research
  • • Firmware fuzzing
Visit Website →

Latest Publications

Discover our recent contributions to embedded systems security research.

2026

Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization

Meng Wang, Philipp Görz, Joschua Schilling, Keno Hassler, Liwei Guo, Thorsten Holz, Ali Abbasi

Network and Distributed System Security Symposium (NDSS) 2026

HoneySat: A Network-based Satellite Honeypot Framework

Efrén López-Morales, Ulysse Planta, Gabriele Marra, Carlos González, Jacob Hopkins, Majid Garoosi, Elías Obreque, Carlos Rubio-Medrano, Ali Abbasi

Network and Distributed System Security Symposium (NDSS) 2026

SmuFuzz: Enable Deep System Management Mode Fuzzing in Fully Featured UEFI Runtime Environment

Jianqiang Wang, Yi Xiang, Meng Wang, Qinying Wang, Ali Abbasi, Thorsten Holz

IEEE Symposium on Security and Privacy (S&P) 2026
Abstract

As part of the UEFI standard, System Management Mode (SMM) was introduced on x86 processors to handle critical hardware events. With strict access control to this operating mode, SMM applications run at a high privilege level (known as Ring -2), in which they have (almost) unlimited access to system resources. However, vendors commonly use memory-unsafe system programming languages to develop SMM applications, which makes them vulnerable to memory corruption and an appealing target for attackers. Fuzzing is an effective method for detecting memory corruption vulnerabilities across a wide range of applications. Unfortunately, existing approaches for testing SMM applications lack a UEFI runtime environment to properly support SMM application execution. Without this environment, application data is often not correctly initialized. Once such uninitialized data is accessed during fuzzing, it causes premature exits or unintentional crashes. As a result, existing methods can only explore shallow parts and often produce high false-positive rates. In this paper, we propose SmuFuzz, a fuzzing framework designed to detect vulnerabilities in closed-source SMM applications distributed by vendors. SmuFuzz overcomes prior limitations by partially rehosting SMM applications within a custom infrastructure that provides a fully featured UEFI runtime environment. This infrastructure provides the necessary dependencies and runtime for SMM application preparation, initialization, and finalization. In addition, SmuFuzz automatically infers the complex SMM application input semantics for deep exploration. In our experiment, SmuFuzz achieved 4.45x higher unique basic block coverage compared to state-of-the-art fuzzers. It also found more vulnerabilities while significantly reducing false positives. Using SmuFuzz, we identified 38 new vulnerabilities in firmware from major vendors, all of which were disclosed responsibly.

Latest News

Stay updated with our latest research achievements and group activities.

Dec 12

Anota paper accepted at NDSS 2026

Our paper, titled 'Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization' was accepted at NDSS 2026.

Dec 12

One Small Patch paper accepted at NDSS SpaceSec workshop 2026

Our paper, titled 'One Small Patch for a File, One Giant Leap for OTA Updates' was accepted at the NDSS SpaceSec workshop 2026.

Nov 26

Honeysat paper accepted at NDSS 2026

Our paper, titled 'HoneySat: A Network-based Satellite Honeypot Framework' was accepted at NDSS 2026.

Open Positions

We welcome applications for PhD and Postdoc positions in embedded systems security. For current openings and application details, see our positions page or contact us.