EMSEC
Embedded Systems Security Group
The EMSEC group at CISPA Helmholtz Center for Information Security conducts cutting-edge research at the intersection of hardware and system security. Our work focuses on hardware-assisted analysis and the protection of mission-critical embedded systems.
Research Areas
Our research combines deep technical insights of both firmware and hardware to build novel analysis techniques for previously unknown attack surfaces.
Firmware Security & Fuzzing
Developing scalable approaches to vulnerability discovery through firmware fuzzing via rehosting and advanced testing techniques for embedded systems.
Hardware-Assisted Security
Employing side-channel analysis for system-level introspection and hardware-assisted techniques to enhance embedded system security.
Space & Automotive Systems
Addressing complex attack surfaces in mission-critical real-world environments, including space systems and automotive security research.
Software Security
Researching malware and sanitization in software environments including python packages, and large, widely used software projects.
Our Team
Meet the researchers, engineers, and students who drive innovation in embedded systems security. Our diverse team brings expertise from multiple domains to tackle complex security challenges.
Ali Abbasi
Group Leader
Research Interests
- • Embedded systems security
- • Security of mission-critical real-time software
- • Secure space and automotive systems
- • Side-channel analysis
- • Firmware fuzzing via rehosting
Ulysse Planta
PhD Student
Research Interests
- • Space systems security
- • Satellite communications
- • Inter-satellite friendly jamming
- • Programmable logic controllers
- • Power side-channel challenges
Meng Wang
PhD Student
Research Interests
- • Bootloader security
- • Memory safety analysis
- • Video hardware acceleration security
- • Differential testing
- • Power side-channel analysis
Pouya Narimani
PhD Student
Research Interests
- • Power side-channel analysis
- • Embedded systems security
- • Side-channel challenges
Martin Mohl
PhD Student
Research Interests
- • Hypervisor security
- • Embedded systems security
- • Firmware analysis
Julian Rederlechner
Research Assistant
Research Interests
- • Space systems security
- • Satellite communications
- • Inter-satellite protocols
- • Inter-satellite friendly jamming
Lisa Röhl
Research Assistant
Research Interests
- • Embedded systems security
- • System security
Majid Garoosi
Research Assistant
Research Interests
- • Embedded systems security
- • Hardware security
- • System analysis
Okhunjon Sobirjonov
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
Kseniia Rogova
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
Harald Neumann
Research Assistant
Research Interests
- • Embedded systems security
- • Security research
Pietro Mazzini
Visiting Researcher
Latest Publications
Discover our recent contributions to embedded systems security research.
2026
SmuFuzz: Enable Deep System Management Mode Fuzzing in Fully Featured UEFI Runtime Environment
Jianqiang Wang, Yi Xiang, Meng Wang, Qinying Wang, Ali Abbasi, Thorsten Holz
Abstract
As part of the UEFI standard, System Management Mode (SMM) was introduced on x86 processors to handle critical hardware events. With strict access control to this operating mode, SMM applications run at a high privilege level (known as Ring -2), in which they have (almost) unlimited access to system resources. However, vendors commonly use memory-unsafe system programming languages to develop SMM applications, which makes them vulnerable to memory corruption and an appealing target for attackers. Fuzzing is an effective method for detecting memory corruption vulnerabilities across a wide range of applications. Unfortunately, existing approaches for testing SMM applications lack a UEFI runtime environment to properly support SMM application execution. Without this environment, application data is often not correctly initialized. Once such uninitialized data is accessed during fuzzing, it causes premature exits or unintentional crashes. As a result, existing methods can only explore shallow parts and often produce high false-positive rates. In this paper, we propose SmuFuzz, a fuzzing framework designed to detect vulnerabilities in closed-source SMM applications distributed by vendors. SmuFuzz overcomes prior limitations by partially rehosting SMM applications within a custom infrastructure that provides a fully featured UEFI runtime environment. This infrastructure provides the necessary dependencies and runtime for SMM application preparation, initialization, and finalization. In addition, SmuFuzz automatically infers the complex SMM application input semantics for deep exploration. In our experiment, SmuFuzz achieved 4.45x higher unique basic block coverage compared to state-of-the-art fuzzers. It also found more vulnerabilities while significantly reducing false positives. Using SmuFuzz, we identified 38 new vulnerabilities in firmware from major vendors, all of which were disclosed responsibly.
Latest News
Stay updated with our latest research achievements and group activities.
Anota paper accepted at NDSS 2026
Our paper, titled 'Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization' was accepted at NDSS 2026.
One Small Patch paper accepted at NDSS SpaceSec workshop 2026
Our paper, titled 'One Small Patch for a File, One Giant Leap for OTA Updates' was accepted at the NDSS SpaceSec workshop 2026.
Honeysat paper accepted at NDSS 2026
Our paper, titled 'HoneySat: A Network-based Satellite Honeypot Framework' was accepted at NDSS 2026.
Open Positions
We welcome applications for PhD and Postdoc positions in embedded systems security. For current openings and application details, see our positions page or contact us.