Web Analytics

Publications

Search in:
Showing 34 of 34

2026

Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization

Meng Wang, Philipp Görz, Joschua Schilling, Keno Hassler, Liwei Guo, Thorsten Holz, Ali Abbasi

Network and Distributed System Security Symposium (NDSS) 2026

HoneySat: A Network-based Satellite Honeypot Framework

Efrén López-Morales, Ulysse Planta, Gabriele Marra, Carlos González, Jacob Hopkins, Majid Garoosi, Elías Obreque, Carlos Rubio-Medrano, Ali Abbasi

Network and Distributed System Security Symposium (NDSS) 2026
Abstract

Satellites are the backbone of mission-critical services that enable our modern society to function, for example, GPS. For years, satellites were assumed to be secure because of their indecipherable architectures and the reliance on security by obscurity. However, technological advancements have made these assumptions obsolete, paving the way for potential attacks. Unfortunately, there is no way to collect data on satellite adversarial techniques, hindering the generation of intelligence that leads to the development of countermeasures. In this paper, we present HoneySat, the first high-interaction satellite honeypot framework, capable of convincingly simulating a real-world CubeSat, a type of Small Satellite (SmallSat). To provide evidence of HoneySat’s effectiveness, we surveyed SmallSat operators and deployed HoneySat over the Internet. Our results show that 90% of satellite operators agreed that HoneySat provides a realistic simulation. Additionally, HoneySat successfully deceived adversaries in the wild and collected 22 real-world adversarial interactions. Finally, we performed a hardware-in-the-loop operation where HoneySat successfully communicated with an in-orbit, operational SmallSat mission.

SmuFuzz: Enable Deep System Management Mode Fuzzing in Fully Featured UEFI Runtime Environment

Jianqiang Wang, Yi Xiang, Meng Wang, Qinying Wang, Ali Abbasi, Thorsten Holz

IEEE Symposium on Security and Privacy (S&P) 2026
Abstract

As part of the UEFI standard, System Management Mode (SMM) was introduced on x86 processors to handle critical hardware events. With strict access control to this operating mode, SMM applications run at a high privilege level (known as Ring -2), in which they have (almost) unlimited access to system resources. However, vendors commonly use memory-unsafe system programming languages to develop SMM applications, which makes them vulnerable to memory corruption and an appealing target for attackers. Fuzzing is an effective method for detecting memory corruption vulnerabilities across a wide range of applications. Unfortunately, existing approaches for testing SMM applications lack a UEFI runtime environment to properly support SMM application execution. Without this environment, application data is often not correctly initialized. Once such uninitialized data is accessed during fuzzing, it causes premature exits or unintentional crashes. As a result, existing methods can only explore shallow parts and often produce high false-positive rates. In this paper, we propose SmuFuzz, a fuzzing framework designed to detect vulnerabilities in closed-source SMM applications distributed by vendors. SmuFuzz overcomes prior limitations by partially rehosting SMM applications within a custom infrastructure that provides a fully featured UEFI runtime environment. This infrastructure provides the necessary dependencies and runtime for SMM application preparation, initialization, and finalization. In addition, SmuFuzz automatically infers the complex SMM application input semantics for deep exploration. In our experiment, SmuFuzz achieved 4.45x higher unique basic block coverage compared to state-of-the-art fuzzers. It also found more vulnerabilities while significantly reducing false positives. Using SmuFuzz, we identified 38 new vulnerabilities in firmware from major vendors, all of which were disclosed responsibly.

2025

A Comprehensive Memory Safety Analysis of Bootloaders

Wang, Jianqiang, Wang, Meng, Wang, Qinying, Langius, Nils, Shi, Li, Abbasi, Ali, Holz, Thorsten

Network and Distributed System Security Symposium (NDSS) 2025
Abstract

Bootloaders are critical components in the boot chain of modern systems, responsible for initializing hardware and loading the operating system. This paper presents a comprehensive analysis of memory safety vulnerabilities in popular bootloader implementations.

TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks

Leonelli, Matteo, Crump, Addison, Wang, Meng, Bauckholt, Florian, Hassler, Keno, Abbasi, Ali, Holz, Thorsten

Network and Distributed System Security Symposium (NDSS) 2025
Abstract

Video hardware acceleration stacks are complex systems that process video data through specialized hardware units. This paper presents TwinFuzz, a novel differential testing approach designed to discover vulnerabilities in video hardware acceleration stacks.

2024

Let Me Do It For You: On the Feasibility of Inter-Satellite Friendly Jamming

Planta, Ulysse, Rederlechner, Julian, Marra, Gabriele, Abbasi, Ali

Security for Space Systems (3S) 2024
Abstract

This paper explores the concept of inter-satellite friendly jamming as a defensive mechanism against malicious interference in satellite constellations.

On the Feasibility of CubeSats Application Sandboxing for Space Missions

Marra, Gabriele, Planta, Ulysse, Wüstenberg, Philipp, Abbasi, Ali

Workshop on the Security of Space and Satellite Systems at NDSS 2024
Abstract

This paper investigates the feasibility of implementing application sandboxing mechanisms in resource-constrained CubeSat environments for enhanced space mission security.

SoK: Security of Programmable Logic Controllers

López-Morales, Efrén, Planta, Ulysse, Rubio-Medrano, Carlos, Abbasi, Ali, Cardenas, Alvaro A

USENIX Security Symposium (USENIX Security) 2024
Abstract

This paper provides a comprehensive systematization of knowledge on the security of Programmable Logic Controllers (PLCs), analyzing current threats, defenses, and research gaps in industrial control systems.

2023

Space odyssey: An experimental software security analysis of satellites

Willbold, Johannes, Schloegel, Moritz, Vögele, Manuel, Gerhardt, Maximilian, Holz, Thorsten, Abbasi, Ali

IEEE Symposium on Security and Privacy (S&P) 2023
Abstract

This paper presents the first comprehensive experimental security analysis of satellite software systems, identifying multiple classes of vulnerabilities and attack vectors.

2022

Fuzzware: Using precise MMIO modeling for effective firmware fuzzing

Scharnowski, Tobias, Bars, Nils, Schloegel, Moritz, Gustafson, Eric, Muench, Marius, Vigna, Giovanni, Kruegel, Christopher, Holz, Thorsten, Abbasi, Ali

USENIX Security Symposium (USENIX Security) 2022
Abstract

This paper presents Fuzzware, a framework for effective firmware fuzzing using precise Memory-Mapped I/O (MMIO) modeling techniques.

Loki: Hardening code obfuscation against automated attacks

Schloegel, Moritz, Blazytko, Tim, Contag, Moritz, Aschermann, Cornelius, Basler, Julius, Holz, Thorsten, Abbasi, Ali

USENIX Security Symposium (USENIX Security) 2022
Abstract

This paper presents Loki, a novel approach to hardening code obfuscation against automated attacks by incorporating adversarial machine learning techniques.

Nyx-net: network fuzzing with incremental snapshots

Schumilo, Sergej, Aschermann, Cornelius, Jemmett, Andrea, Abbasi, Ali, Holz, Thorsten

Proceedings of the Seventeenth European Conference on Computer Systems 2022
Abstract

This paper presents Nyx-net, a novel network fuzzing framework that leverages incremental snapshots to achieve high-performance network protocol testing.

2021

Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types

Schumilo, Sergej, Aschermann, Cornelius, Abbasi, Ali, Wörner, Simon, Holz, Thorsten

USENIX Security Symposium (USENIX Security) 2021
Abstract

This paper presents Nyx, a greybox hypervisor fuzzing framework that uses fast snapshots and affine types for effective vulnerability discovery in hypervisors.

Technical Report: Hardening Code Obfuscation Against Automated Attacks

Schloegel, Moritz, Blazytko, Tim, Contag, Moritz, Aschermann, Cornelius, Basler, Julius, Holz, Thorsten, Abbasi, Ali

arXiv preprint 2021
Abstract

Technical report providing detailed analysis of hardening code obfuscation techniques against automated reverse engineering attacks.

2020

AURORA: Statistical Crash Analysis for Automated Root Cause Explanation

Blazytko, Tim, Schlögel, Moritz, Aschermann, Cornelius, Abbasi, Ali, Frank, Joel, Wörner, Simon, Holz, Thorsten

USENIX Security Symposium (USENIX Security) 2020
Abstract

This paper presents AURORA, a system for automated root cause explanation of software crashes through statistical analysis techniques.

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Schumilo, Sergej, Aschermann, Cornelius, Abbasi, Ali, Wörner, Simon, Holz, Thorsten

Network and Distributed System Security Symposium (NDSS) 2020
Abstract

This paper presents HYPER-CUBE, a novel approach for high-dimensional hypervisor fuzzing to discover security vulnerabilities in virtualization systems.

IJON: Exploring Deep State Spaces via Fuzzing

Aschermann, Cornelius, Schumilo, Sergej, Abbasi, Ali, Holz, Thorsten

IEEE Symposium on Security and Privacy (S&P) 2020
Abstract

This paper presents IJON, a fuzzing technique for exploring deep state spaces in complex software systems through guided exploration methods.

2019

ANTIFUZZ: impeding fuzzing audits of binary executables

Güler, Emre, Aschermann, Cornelius, Abbasi, Ali, Holz, Thorsten

USENIX Security Symposium (USENIX Security) 2019
Abstract

This paper presents ANTIFUZZ, techniques for impeding fuzzing audits of binary executables to protect software from security analysis.

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, Ali, Wetzels, Jos, Holz, Thorsten, Etalle, Sandro

IEEE European Symposium on Security and Privacy (EuroS&P) 2019
Abstract

This paper analyzes the unique challenges in designing exploit mitigations for deeply embedded systems with severe resource constraints.

Doors of Durin: the Veiled Gate to Siemens S7 Silicon

Abbasi, Ali, Scharnowski, Tobias

Black Hat Europe 2019
Abstract

This presentation reveals hidden debug interfaces and backdoors in Siemens S7 programmable logic controllers, demonstrating novel attack vectors.

GRIMOIRE: Synthesizing Structure while Fuzzing

Blazytko, Tim, Bishop, Matt, Aschermann, Cornelius, Cappos, Justin, Schlögel, Moritz, Korshun, Nadia, Abbasi, Ali, Schweighauser, Marco, Schinzel, Sebastian, Schumilo, Sergej, others

USENIX Security Symposium (USENIX Security) 2019
Abstract

This paper presents GRIMOIRE, a fuzzing technique that synthesizes structure while fuzzing to improve coverage and vulnerability discovery.

2018

Dissecting QNX

Wetzels, Jos, Abbasi, Ali

Proc. Blackhat Briefings 2018
Abstract

This presentation provides a detailed security analysis of the QNX real-time operating system commonly used in automotive and embedded systems.

Race to the bottom: embedded control systems binary security: an industrial control system protection approach

Abbasi, A

2018
Abstract

This PhD thesis presents a comprehensive approach to embedded control systems binary security with focus on industrial control system protection.

2017

ECFI: Asynchronous control flow integrity for programmable logic controllers

Abbasi, Ali, Holz, Thorsten, Zambon, Emmanuele, Etalle, Sandro

Annual Computer Security Applications Conference 2017
Abstract

This paper presents ECFI, an asynchronous control flow integrity mechanism specifically designed for programmable logic controllers.

Ghost in the plc vs ghostbuster: on the feasibility of detecting pin control attack in programmable logic controllers

Abbasi, Ali, Genuise, Andrea

2017
Abstract

This work investigates the feasibility of detecting pin control attacks in programmable logic controllers and proposes detection mechanisms.

On the significance of process comprehension for conducting targeted ICS attacks

Green, Benjamin, Krotofil, Marina, Abbasi, Ali

Workshop on Cyber-Physical Systems Security and PrivaCy 2017
Abstract

This paper analyzes the importance of understanding industrial processes for conducting effective attacks against industrial control systems.

Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems

Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro

International Conference on Network and System Security 2017
Abstract

This paper presents Shield, a configurable mitigation framework for code-reuse attacks specifically designed for embedded systems.

Stealth low-level manipulation of programmable logic controllers i/o by pin control exploitation

Abbasi, Ali, Hashemi, Majid, Zambon, Emmanuele, Etalle, Sandro

Critical Information Infrastructures Security 2017
Abstract

This paper demonstrates stealth techniques for low-level manipulation of PLC I/O through pin control exploitation methods.

2016

Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack

Abbasi, Ali, Hashemi, Majid

Black Hat Europe 2016
Abstract

This work presents techniques for designing undetectable rootkits for programmable logic controllers using pin control attacks.

Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers' I/O

Abbasi, Ali

2016
Abstract

This work demonstrates stealth techniques for on-the-fly manipulation of PLC I/O systems without detection.

2014

APTs way: evading Your EBNIDS

Abbasi, Ali, Wetzel, Jos

Black Hat Europe 2014
Abstract

This presentation demonstrates advanced persistent threat techniques for evading emulation-based network intrusion detection systems.

On emulation-based network intrusion detection systems

Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro

International Conference on Recent Advances in Intrusion Detection 2014
Abstract

This paper analyzes emulation-based network intrusion detection systems and their effectiveness against modern attack techniques.

2013

Project IRUS: multifaceted approach to attacking and defending ICS

Beresford, Dilloni, Abbasi, Ali Beresford

SCADA Security Scientific Symposium (S4) 2013
Abstract

This presentation outlines Project IRUS, a comprehensive approach to both attacking and defending industrial control systems.

2011

A gray-box DPDA-based intrusion detection technique using system-call monitoring

Jafarian, Jafar Haadi, Abbasi, Ali, Sheikhabadi, Siavash Safaei

Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference 2011
Abstract

This paper presents a gray-box intrusion detection technique based on deterministic pushdown automata using system-call monitoring.