GRIMOIRE: Synthesizing Structure while Fuzzing, Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, and Thorsten Holz, USENIX Security Symposium, Santa Clara, CA, USA, August 2019.
AntiFuzz: Impeding Fuzzing Audits of Binary Executables, Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz, USENIX Security Symposium, Santa Clara, CA, USA, August 2019.
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems., Ali Abbasi, Jos Wetzels, Thorsten Holz, and Sandro Etalle, Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, June 2019.
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers, Ali Abbasi, Thorsten Holz, Emmanuele Zambon, and Sandro Etalle, Proceedings of the 33nd Annual Conference on Computer Security Applications (ACSAC), 2017, Orlando, Florida, USA.
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks, Benjamin Green, Marina Krotofil, Ali Abbasi, Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, November 2017, Dallas, USA.
μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle , International Conference on Network and System Security, August 2017, Helsinki, Finland.
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation, Ali Abbasi, Majid Hashemi, Emmanuele Zambon and Sandro Etalle, Proceedings of the 11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France.
On Emulation-Based Network Intrusion Detection Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, and Sandro Etalle, Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defences (RAID), September 17-19, 2014, Gothenburg, Sweden (Video Available).
Advanced HTML5 Exploitation Techniques, Sungbai Sun, Ali Abbasi, Zhuge Jianwei, CNCC CCF China National Computer Congress (CNCC201200118), October 2012, Dalian, China.
A Gray-Box DPDA-Based Intrusion Detection Technique Using System-Call Monitoring, Jafar Hadi Jafarian, Ali Abbasi, Siavash Safaei Sheikhabadi, The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), Sep 2011, Perth, WA, Australia. Technical Conferences
Embedded Control Systems Binary Security: An Industrial Control System Protection Approach, Ali Abbasi, Black Hat Sessions, Jun 2019, Nieuwegein, The Netherlands.
TRITON: A Hammer into the Head of Safety Instrumented Systems, Ali Abbasi, Jos Wetzeks, National Cyber Security Center (NCSC), March 2018, The Hague, The Netherlands.
Analyzing & Breaking Exploit Mitigations and PRNGs on QNX For Automotive, Industrial, Medical and Other Embedded Systems, Ali Abbasi, Jos Wetzels , BlackHat Asia, March 2018, Singapore.
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators, Ali Abbasi, Jos Wetzels , REcon Brussels (REconBRX), February 2018, Brussels, Belgium.
Code-Reuse Attack Mitigation for COTS Programmable Logic Controller Binaries, Ali Abbasi , Stockholm International Summit on Cyber Security in SCADA and Industrial Control Systems (CS3STHLM), October 2017, Stockholm, Sweden.
Embedded Security from Software to Hardware, Ali Abbasi , International NCSC One Conference, National Cyber Security Centrum, April 2017, Hague, The Netherlands.
Security Controls & Vulnerabilities in Embedded System OS, Ali Abbasi , S4xEurope, Jun 2017, Vienna, Austria.
Ghost in the Machine: Challenges in Embedded Binary Security, Jos Wetzels, Ali Abbasi , USENIX Enigma, January 2017, Oakland, CA, USA.
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack, Ali Abbasi, Majid Hashemi, Chaos Communication Congress (33C3), December 2016, Hamburg, Germany.
Wheel of Fortune: Analyzing Embedded OS Random Number Generators, Jos Wetzels, Ali Abbasi, Chaos Communication Congress (33C3), December 2016, Hamburg, Germany.
Defeating Pin Control in Programmable Logic Controllers, Ali Abbasi, Majid Hashemi, ZeroNights, November 2016, Moscow, Russia.
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit, Ali Abbasi, Majid Hashemi, Black Hat Europe, November 2016, London, United Kingdom (Video Available).
APTs Way, Evading your EBNIDS, Ali Abbasi, Jos Wetzels, Black Hat Europe, October 2014, Amsterdam, The Netherlands (Video Available).
Project IRUS: A Multifaceted Approach to Attacking and Defending ICS, Ali Abbasi, Dillon Beresford, Digital Bond’s SCADA Security Scientific Symposium (S4), Jan 2013, Miami, USA
Critical Infrastructure Vulnerability Assessment and Protection from Protocol Layer to Hardware Layer, Ali Abbasi, Master thesis, Tsinghua University, Jun 2013, Beijing, China.