Publications
2026
HoneySat: A Network-based Satellite Honeypot Framework
Efrén López-Morales, Ulysse Planta, Gabriele Marra, Carlos González, Jacob Hopkins, Majid Garoosi, Elías Obreque, Carlos Rubio-Medrano, Ali Abbasi
Abstract
Satellites are the backbone of mission-critical services that enable our modern society to function, for example, GPS. For years, satellites were assumed to be secure because of their indecipherable architectures and the reliance on security by obscurity. However, technological advancements have made these assumptions obsolete, paving the way for potential attacks. Unfortunately, there is no way to collect data on satellite adversarial techniques, hindering the generation of intelligence that leads to the development of countermeasures. In this paper, we present HoneySat, the first high-interaction satellite honeypot framework, capable of convincingly simulating a real-world CubeSat, a type of Small Satellite (SmallSat). To provide evidence of HoneySat’s effectiveness, we surveyed SmallSat operators and deployed HoneySat over the Internet. Our results show that 90% of satellite operators agreed that HoneySat provides a realistic simulation. Additionally, HoneySat successfully deceived adversaries in the wild and collected 22 real-world adversarial interactions. Finally, we performed a hardware-in-the-loop operation where HoneySat successfully communicated with an in-orbit, operational SmallSat mission.
SmuFuzz: Enable Deep System Management Mode Fuzzing in Fully Featured UEFI Runtime Environment
Jianqiang Wang, Yi Xiang, Meng Wang, Qinying Wang, Ali Abbasi, Thorsten Holz
Abstract
As part of the UEFI standard, System Management Mode (SMM) was introduced on x86 processors to handle critical hardware events. With strict access control to this operating mode, SMM applications run at a high privilege level (known as Ring -2), in which they have (almost) unlimited access to system resources. However, vendors commonly use memory-unsafe system programming languages to develop SMM applications, which makes them vulnerable to memory corruption and an appealing target for attackers. Fuzzing is an effective method for detecting memory corruption vulnerabilities across a wide range of applications. Unfortunately, existing approaches for testing SMM applications lack a UEFI runtime environment to properly support SMM application execution. Without this environment, application data is often not correctly initialized. Once such uninitialized data is accessed during fuzzing, it causes premature exits or unintentional crashes. As a result, existing methods can only explore shallow parts and often produce high false-positive rates. In this paper, we propose SmuFuzz, a fuzzing framework designed to detect vulnerabilities in closed-source SMM applications distributed by vendors. SmuFuzz overcomes prior limitations by partially rehosting SMM applications within a custom infrastructure that provides a fully featured UEFI runtime environment. This infrastructure provides the necessary dependencies and runtime for SMM application preparation, initialization, and finalization. In addition, SmuFuzz automatically infers the complex SMM application input semantics for deep exploration. In our experiment, SmuFuzz achieved 4.45x higher unique basic block coverage compared to state-of-the-art fuzzers. It also found more vulnerabilities while significantly reducing false positives. Using SmuFuzz, we identified 38 new vulnerabilities in firmware from major vendors, all of which were disclosed responsibly.
2025
A Comprehensive Memory Safety Analysis of Bootloaders
Wang, Jianqiang, Wang, Meng, Wang, Qinying, Langius, Nils, Shi, Li, Abbasi, Ali, Holz, Thorsten
Abstract
Bootloaders are critical components in the boot chain of modern systems, responsible for initializing hardware and loading the operating system. This paper presents a comprehensive analysis of memory safety vulnerabilities in popular bootloader implementations.
TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks
Leonelli, Matteo, Crump, Addison, Wang, Meng, Bauckholt, Florian, Hassler, Keno, Abbasi, Ali, Holz, Thorsten
Abstract
Video hardware acceleration stacks are complex systems that process video data through specialized hardware units. This paper presents TwinFuzz, a novel differential testing approach designed to discover vulnerabilities in video hardware acceleration stacks.
2024
Let Me Do It For You: On the Feasibility of Inter-Satellite Friendly Jamming
Planta, Ulysse, Rederlechner, Julian, Marra, Gabriele, Abbasi, Ali
Abstract
This paper explores the concept of inter-satellite friendly jamming as a defensive mechanism against malicious interference in satellite constellations.
On the Feasibility of CubeSats Application Sandboxing for Space Missions
Marra, Gabriele, Planta, Ulysse, Wüstenberg, Philipp, Abbasi, Ali
Abstract
This paper investigates the feasibility of implementing application sandboxing mechanisms in resource-constrained CubeSat environments for enhanced space mission security.
SoK: Security of Programmable Logic Controllers
López-Morales, Efrén, Planta, Ulysse, Rubio-Medrano, Carlos, Abbasi, Ali, Cardenas, Alvaro A
Abstract
This paper provides a comprehensive systematization of knowledge on the security of Programmable Logic Controllers (PLCs), analyzing current threats, defenses, and research gaps in industrial control systems.
2023
Space odyssey: An experimental software security analysis of satellites
Willbold, Johannes, Schloegel, Moritz, Vögele, Manuel, Gerhardt, Maximilian, Holz, Thorsten, Abbasi, Ali
Abstract
This paper presents the first comprehensive experimental security analysis of satellite software systems, identifying multiple classes of vulnerabilities and attack vectors.
2022
Fuzzware: Using precise MMIO modeling for effective firmware fuzzing
Scharnowski, Tobias, Bars, Nils, Schloegel, Moritz, Gustafson, Eric, Muench, Marius, Vigna, Giovanni, Kruegel, Christopher, Holz, Thorsten, Abbasi, Ali
Abstract
This paper presents Fuzzware, a framework for effective firmware fuzzing using precise Memory-Mapped I/O (MMIO) modeling techniques.
Loki: Hardening code obfuscation against automated attacks
Schloegel, Moritz, Blazytko, Tim, Contag, Moritz, Aschermann, Cornelius, Basler, Julius, Holz, Thorsten, Abbasi, Ali
Abstract
This paper presents Loki, a novel approach to hardening code obfuscation against automated attacks by incorporating adversarial machine learning techniques.
Nyx-net: network fuzzing with incremental snapshots
Schumilo, Sergej, Aschermann, Cornelius, Jemmett, Andrea, Abbasi, Ali, Holz, Thorsten
Abstract
This paper presents Nyx-net, a novel network fuzzing framework that leverages incremental snapshots to achieve high-performance network protocol testing.
2021
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types
Schumilo, Sergej, Aschermann, Cornelius, Abbasi, Ali, Wörner, Simon, Holz, Thorsten
Abstract
This paper presents Nyx, a greybox hypervisor fuzzing framework that uses fast snapshots and affine types for effective vulnerability discovery in hypervisors.
Technical Report: Hardening Code Obfuscation Against Automated Attacks
Schloegel, Moritz, Blazytko, Tim, Contag, Moritz, Aschermann, Cornelius, Basler, Julius, Holz, Thorsten, Abbasi, Ali
Abstract
Technical report providing detailed analysis of hardening code obfuscation techniques against automated reverse engineering attacks.
2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
Blazytko, Tim, Schlögel, Moritz, Aschermann, Cornelius, Abbasi, Ali, Frank, Joel, Wörner, Simon, Holz, Thorsten
Abstract
This paper presents AURORA, a system for automated root cause explanation of software crashes through statistical analysis techniques.
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
Schumilo, Sergej, Aschermann, Cornelius, Abbasi, Ali, Wörner, Simon, Holz, Thorsten
Abstract
This paper presents HYPER-CUBE, a novel approach for high-dimensional hypervisor fuzzing to discover security vulnerabilities in virtualization systems.
IJON: Exploring Deep State Spaces via Fuzzing
Aschermann, Cornelius, Schumilo, Sergej, Abbasi, Ali, Holz, Thorsten
Abstract
This paper presents IJON, a fuzzing technique for exploring deep state spaces in complex software systems through guided exploration methods.
2019
ANTIFUZZ: impeding fuzzing audits of binary executables
Güler, Emre, Aschermann, Cornelius, Abbasi, Ali, Holz, Thorsten
Abstract
This paper presents ANTIFUZZ, techniques for impeding fuzzing audits of binary executables to protect software from security analysis.
Challenges in designing exploit mitigations for deeply embedded systems
Abbasi, Ali, Wetzels, Jos, Holz, Thorsten, Etalle, Sandro
Abstract
This paper analyzes the unique challenges in designing exploit mitigations for deeply embedded systems with severe resource constraints.
GRIMOIRE: Synthesizing Structure while Fuzzing
Blazytko, Tim, Bishop, Matt, Aschermann, Cornelius, Cappos, Justin, Schlögel, Moritz, Korshun, Nadia, Abbasi, Ali, Schweighauser, Marco, Schinzel, Sebastian, Schumilo, Sergej, others
Abstract
This paper presents GRIMOIRE, a fuzzing technique that synthesizes structure while fuzzing to improve coverage and vulnerability discovery.
2018
2017
ECFI: Asynchronous control flow integrity for programmable logic controllers
Abbasi, Ali, Holz, Thorsten, Zambon, Emmanuele, Etalle, Sandro
Abstract
This paper presents ECFI, an asynchronous control flow integrity mechanism specifically designed for programmable logic controllers.
Ghost in the plc vs ghostbuster: on the feasibility of detecting pin control attack in programmable logic controllers
Abbasi, Ali, Genuise, Andrea
Abstract
This work investigates the feasibility of detecting pin control attacks in programmable logic controllers and proposes detection mechanisms.
On the significance of process comprehension for conducting targeted ICS attacks
Green, Benjamin, Krotofil, Marina, Abbasi, Ali
Abstract
This paper analyzes the importance of understanding industrial processes for conducting effective attacks against industrial control systems.
Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro
Abstract
This paper presents Shield, a configurable mitigation framework for code-reuse attacks specifically designed for embedded systems.
Stealth low-level manipulation of programmable logic controllers i/o by pin control exploitation
Abbasi, Ali, Hashemi, Majid, Zambon, Emmanuele, Etalle, Sandro
Abstract
This paper demonstrates stealth techniques for low-level manipulation of PLC I/O through pin control exploitation methods.
2016
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack
Abbasi, Ali, Hashemi, Majid
Abstract
This work presents techniques for designing undetectable rootkits for programmable logic controllers using pin control attacks.
2014
On emulation-based network intrusion detection systems
Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro
Abstract
This paper analyzes emulation-based network intrusion detection systems and their effectiveness against modern attack techniques.
2013
Project IRUS: multifaceted approach to attacking and defending ICS
Beresford, Dilloni, Abbasi, Ali Beresford
Abstract
This presentation outlines Project IRUS, a comprehensive approach to both attacking and defending industrial control systems.
2011
A gray-box DPDA-based intrusion detection technique using system-call monitoring
Jafarian, Jafar Haadi, Abbasi, Ali, Sheikhabadi, Siavash Safaei
Abstract
This paper presents a gray-box intrusion detection technique based on deterministic pushdown automata using system-call monitoring.