var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fhomepage.ruhr-uni-bochum.de%2Fali.abbasi-i4q%2Falipub.bib&jsonp=1&fullnames=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fhomepage.ruhr-uni-bochum.de%2Fali.abbasi-i4q%2Falipub.bib&jsonp=1&fullnames=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fhomepage.ruhr-uni-bochum.de%2Fali.abbasi-i4q%2Falipub.bib&jsonp=1&fullnames=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n HYPER-CUBE: High-Dimensional Hypervisor Fuzzing.\n \n \n \n\n\n \n Sergej Schumilo; Cornelius Aschermann; Ali Abbasi; Simon Wörner; and Thorsten Holz.\n\n\n \n\n\n\n In Network and Distributed System Security Symposium (NDSS), 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{schumilo2020hyper,\n  title={HYPER-CUBE: High-Dimensional Hypervisor Fuzzing},\n  author={Schumilo, Sergej and Aschermann, Cornelius and Abbasi, Ali and W{\\"o}rner, Simon and Holz, Thorsten},\n  booktitle={Network and Distributed System Security Symposium (NDSS)},\n  year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n IJON: Exploring Deep State Spaces via Fuzzing.\n \n \n \n\n\n \n Cornelius Aschermann; Sergej Schumilo; Ali Abbasi; and Thorsten Holz.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (Oakland), 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{aschermann2020ijon,\n  title={IJON: Exploring Deep State Spaces via Fuzzing},\n  author={Aschermann, Cornelius and Schumilo, Sergej and Abbasi, Ali and Holz, Thorsten},\n  booktitle={IEEE Symposium on Security and Privacy (Oakland)},\n  year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.\n \n \n \n\n\n \n Tim Blazytko; Moritz Schlögel; Cornelius Aschermann; Ali Abbasi; Joel Frank; Simon Wörner; and Thorsten Holz.\n\n\n \n\n\n\n In 29th USENIX Security Symposium, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{blazytko2020aurora,\n  title={AURORA: Statistical Crash Analysis for Automated Root Cause Explanation},\n  author={Blazytko, Tim and Schl{\\"o}gel, Moritz and Aschermann, Cornelius and Abbasi, Ali and Frank, Joel and W{\\"o}rner, Simon and Holz, Thorsten},\n  booktitle={29th USENIX Security Symposium},\n  year={2020}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Challenges in designing exploit mitigations for deeply embedded systems.\n \n \n \n\n\n \n Ali Abbasi; Jos Wetzels; Thorsten Holz; and Sandro Etalle.\n\n\n \n\n\n\n In 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pages 31–46, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abbasi2019challenges,\n  title={Challenges in designing exploit mitigations for deeply embedded systems},\n  author={Abbasi, Ali and Wetzels, Jos and Holz, Thorsten and Etalle, Sandro},\n  booktitle={2019 IEEE European Symposium on Security and Privacy (EuroS\\&P)},\n  pages={31--46},\n  year={2019},\n  organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ANTIFUZZ: impeding fuzzing audits of binary executables.\n \n \n \n\n\n \n Emre Güler; Cornelius Aschermann; Ali Abbasi; and Thorsten Holz.\n\n\n \n\n\n\n In 28th USENIX Security Symposium (USENIX Security 19), pages 1931–1947, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 196 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{guler2019antifuzz,\n  title={ANTIFUZZ: impeding fuzzing audits of binary executables},\n  author={G{\\"u}ler, Emre and Aschermann, Cornelius and Abbasi, Ali and Holz, Thorsten},\n  booktitle={28th USENIX Security Symposium (USENIX Security 19)},\n  pages={1931--1947},\n  year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n GRIMOIRE: Synthesizing Structure while Fuzzing.\n \n \n \n\n\n \n Tim Blazytko; Matt Bishop; Cornelius Aschermann; Justin Cappos; Moritz Schlögel; Nadia Korshun; Ali Abbasi; Marco Schweighauser; Sebastian Schinzel; Sergej Schumilo; and others.\n\n\n \n\n\n\n In 28th USENIX Security Symposium (USENIX Security 19), pages 1985–2002, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{blazytko2019grimoire,\n  title={GRIMOIRE: Synthesizing Structure while Fuzzing},\n  author={Blazytko, Tim and Bishop, Matt and Aschermann, Cornelius and Cappos, Justin and Schl{\\"o}gel, Moritz and Korshun, Nadia and Abbasi, Ali and Schweighauser, Marco and Schinzel, Sebastian and Schumilo, Sergej and others},\n  booktitle={28th USENIX Security Symposium (USENIX Security 19)},\n  pages={1985--2002},\n  year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Race to the bottom: embedded control systems binary security: an industrial control system protection approach.\n \n \n \n\n\n \n Ali Abbasi.\n\n\n \n\n\n\n Ph.D. Thesis, 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{abbasi2018race,\n  title={Race to the bottom: embedded control systems binary security: an industrial control system protection approach},\n  type = {phdthesis},\n  author={Abbasi, Ali},\n  year={2018},\n  institution = {Eindhoven University of Technology},\n\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dissecting QNX.\n \n \n \n\n\n \n Jos Wetzels; and Ali Abbasi.\n\n\n \n\n\n\n 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{wetzels2018dissecting,\n  title={Dissecting QNX},\n  author={Wetzels, Jos and Abbasi, Ali},\n  year={2018}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On the significance of process comprehension for conducting targeted ICS attacks.\n \n \n \n\n\n \n Benjamin Green; Marina Krotofil; and Ali Abbasi.\n\n\n \n\n\n\n In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, pages 57–67, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{green2017significance,\n  title={On the significance of process comprehension for conducting targeted ICS attacks},\n  author={Green, Benjamin and Krotofil, Marina and Abbasi, Ali},\n  booktitle={Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy},\n  pages={57--67},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Ghost in the PLC vs GhostBuster: on the feasibility of detecting pin control attack in Programmable Logic Controllers.\n \n \n \n\n\n \n Ali Abbasi; and Andrea Genuise.\n\n\n \n\n\n\n In Ghost in the PLC vs GhostBuster: On the Feasibility of Detecting Pin Control Attack in Programmable Logic Controllers. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{abbasi2017ghost,\n  title={Ghost in the PLC vs GhostBuster: on the feasibility of detecting pin control attack in Programmable Logic Controllers},\n  author={Abbasi, Ali and Genuise, Andrea},\n  booktitle={Ghost in the PLC vs GhostBuster: On the Feasibility of Detecting Pin Control Attack in Programmable Logic Controllers},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ECFI: Asynchronous control flow integrity for programmable logic controllers.\n \n \n \n\n\n \n Ali Abbasi; Thorsten Holz; Emmanuele Zambon; and Sandro Etalle.\n\n\n \n\n\n\n In Proceedings of the 33rd Annual Computer Security Applications Conference, pages 437–448, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abbasi2017ecfi,\n  title={ECFI: Asynchronous control flow integrity for programmable logic controllers},\n  author={Abbasi, Ali and Holz, Thorsten and Zambon, Emmanuele and Etalle, Sandro},\n  booktitle={Proceedings of the 33rd Annual Computer Security Applications Conference},\n  pages={437--448},\n  year={2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n µShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems.\n \n \n \n\n\n \n Ali Abbasi; Jos Wetzels; Wouter Bokslag; Emmanuele Zambon; and Sandro Etalle.\n\n\n \n\n\n\n In International Conference on Network and System Security, pages 694–709, 2017. Springer\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abbasi2017mu,\n  title={µShield: Configurable Code-Reuse Attacks Mitigation For\nEmbedded Systems},\n  author={Abbasi, Ali and Wetzels, Jos and Bokslag, Wouter and Zambon, Emmanuele and Etalle, Sandro},\n  booktitle={International Conference on Network and System Security},\n  pages={694--709},\n  year={2017},\n  organization={Springer}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation.\n \n \n \n\n\n \n Ali Abbasi; Majid Hashemi; Emmanuele Zambon; and Sandro Etalle.\n\n\n \n\n\n\n In International Conference on Critical Information Infrastructures Security, pages 1–12, 2016. Springer\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abbasi2016stealth,\n  title={Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation},\n  author={Abbasi, Ali and Hashemi, Majid and Zambon, Emmanuele and Etalle, Sandro},\n  booktitle={International Conference on Critical Information Infrastructures Security},\n  pages={1--12},\n  year={2016},\n  organization={Springer}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack.\n \n \n \n\n\n \n Ali Abbasi; and Majid Hashemi.\n\n\n \n\n\n\n Black Hat Europe,1–35. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{abbasi2016ghost,\n  title={Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack},\n  author={Abbasi, Ali and Hashemi, Majid},\n  journal={Black Hat Europe},\n  pages={1--35},\n  year={2016},\n  publisher={Black Hat}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O.\n \n \n \n\n\n \n Ali Abbasi.\n\n\n \n\n\n\n CTIT Technical Report Series, (TR-CTIT-16-02). 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{abbasi2016ghost,\n  title={Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O},\n  author={Abbasi, Ali},\n  journal={CTIT Technical Report Series},\n  number={TR-CTIT-16-02},\n  year={2016},\n  publisher={Centre for Telematics and Information Technology (CTIT)}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On emulation-based network intrusion detection systems.\n \n \n \n\n\n \n Ali Abbasi; Jos Wetzels; Wouter Bokslag; Emmanuele Zambon; and Sandro Etalle.\n\n\n \n\n\n\n In International Conference on Recent Advances in Intrusion Detection, pages 384–404, 2014. Springer, Cham\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abbasi2014emulation,\n  title={On emulation-based network intrusion detection systems},\n  author={Abbasi, Ali and Wetzels, Jos and Bokslag, Wouter and Zambon, Emmanuele and Etalle, Sandro},\n  booktitle={International Conference on Recent Advances in Intrusion Detection},\n  pages={384--404},\n  year={2014},\n  organization={Springer, Cham}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n APTs way: evading Your EBNIDS.\n \n \n \n\n\n \n Ali Abbasi; and Jos Wetzel.\n\n\n \n\n\n\n Presented at Black Hat Europe 2014. 2014.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{abbasi2014apts,\n  title={APTs way: evading Your EBNIDS},\n  author={Abbasi, Ali and Wetzel, Jos},\n  journal={Presented at Black Hat Europe 2014},\n  year={2014}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Project IRUS: multifaceted approach to attacking and defending ICS.\n \n \n \n\n\n \n Dilloni Beresford; and Ali Beresford Abbasi.\n\n\n \n\n\n\n In SCADA Security Scientific Symposium (S4), 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{beresford2013project,\n  title={Project IRUS: multifaceted approach to attacking and defending ICS},\n  author={Beresford, Dilloni and Abbasi, Ali Beresford},\n  booktitle={SCADA Security Scientific Symposium (S4)},\n  year={2013}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Research on HTML5 Security.\n \n \n \n\n\n \n Sun Songbai; Ali Abbasi; Zhuge Jianwei; and Duan Haixin.\n\n\n \n\n\n\n In CNCC CCF China National Computer Congress (CNCC201200118), 2012. Dalian, China\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{songbai2012research,\n  title={Research on HTML5 Security},\n  author={Songbai, Sun and Abbasi, Ali and Jianwei, Zhuge and Haixin, Duan},\n  booktitle={CNCC CCF China National Computer Congress (CNCC201200118)},\n  year={2012},\n  organization={Dalian, China}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A gray-box DPDA-based intrusion detection technique using system-call monitoring.\n \n \n \n\n\n \n Jafar Haadi Jafarian; Ali Abbasi; and Siavash Safaei Sheikhabadi.\n\n\n \n\n\n\n In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pages 1–12, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{jafarian2011gray,\n  title={A gray-box DPDA-based intrusion detection technique using system-call monitoring},\n  author={Jafarian, Jafar Haadi and Abbasi, Ali and Sheikhabadi, Siavash Safaei},\n  booktitle={Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference},\n  pages={1--12},\n  year={2011}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);