generated by bibbase.org
  2023 (1)
Space Odyssey: An Experimental Software Security Analysis of Satellites. Willbold, J.; Schloegel, M.; Vögele, M.; Gerhardt, M.; Holz, T.; and Abbasi, A. In 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pages 1–19, 2023. IEEE
Space Odyssey: An Experimental Software Security Analysis of Satellites [link]Paper   doi   link   bibtex   2 downloads  
  2022 (3)
Nyx-net: network fuzzing with incremental snapshots. Schumilo, S.; Aschermann, C.; Jemmett, A.; Abbasi, A.; and Holz, T. In Bromberg, Y.; Kermarrec, A.; and Kozyrakis, C., editor(s), EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022, pages 166–180, 2022. ACM
Nyx-net: network fuzzing with incremental snapshots [link]Paper   doi   link   bibtex   1 download  
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. Scharnowski, T.; Bars, N.; Schloegel, M.; Gustafson, E.; Muench, M.; Vigna, G.; Kruegel, C.; Holz, T.; and Abbasi, A. In Butler, K. R. B.; and Thomas, K., editor(s), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pages 1239–1256, 2022. USENIX Association
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing [link]Paper   link   bibtex   1 download  
Loki: Hardening Code Obfuscation Against Automated Attacks. Schloegel, M.; Blazytko, T.; Contag, M.; Aschermann, C.; Basler, J.; Holz, T.; and Abbasi, A. In Butler, K. R. B.; and Thomas, K., editor(s), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pages 3055–3073, 2022. USENIX Association
Loki: Hardening Code Obfuscation Against Automated Attacks [link]Paper   link   bibtex  
  2021 (3)
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. Schumilo, S.; Aschermann, C.; Abbasi, A.; Wörner, S.; and Holz, T. In Bailey, M. D.; and Greenstadt, R., editor(s), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pages 2597–2614, 2021. USENIX Association
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types [link]Paper   link   bibtex   2 downloads  
Loki: Hardening Code Obfuscation Against Automated Attacks. Schloegel, M.; Blazytko, T.; Contag, M.; Aschermann, C.; Basler, J.; Holz, T.; and Abbasi, A. CoRR, abs/2106.08913. 2021.
Loki: Hardening Code Obfuscation Against Automated Attacks [link]Paper   link   bibtex  
Nyx-Net: Network Fuzzing with Incremental Snapshots. Schumilo, S.; Aschermann, C.; Jemmett, A.; Abbasi, A.; and Holz, T. CoRR, abs/2111.03013. 2021.
Nyx-Net: Network Fuzzing with Incremental Snapshots [link]Paper   link   bibtex   1 download  
  2020 (4)
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. Schumilo, S.; Aschermann, C.; Abbasi, A.; Wörner, S.; and Holz, T. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020, 2020. The Internet Society
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing [link]Paper   link   bibtex   1 download  
Ijon: Exploring Deep State Spaces via Fuzzing. Aschermann, C.; Schumilo, S.; Abbasi, A.; and Holz, T. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020, pages 1597–1612, 2020. IEEE
Ijon: Exploring Deep State Spaces via Fuzzing [link]Paper   doi   link   bibtex  
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. Blazytko, T.; Schlögel, M.; Aschermann, C.; Abbasi, A.; Frank, J.; Wörner, S.; and Holz, T. In Capkun, S.; and Roesner, F., editor(s), 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pages 235–252, 2020. USENIX Association
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation [link]Paper   link   bibtex  
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. Abbasi, A.; Wetzels, J.; Holz, T.; and Etalle, S. CoRR, abs/2007.02307. 2020.
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems [link]Paper   link   bibtex   2 downloads  
  2019 (3)
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. Abbasi, A.; Wetzels, J.; Holz, T.; and Etalle, S. In IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, pages 31–46, 2019. IEEE
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems [link]Paper   doi   link   bibtex   1 download  
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. Güler, E.; Aschermann, C.; Abbasi, A.; and Holz, T. In Heninger, N.; and Traynor, P., editor(s), 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, pages 1931–1947, 2019. USENIX Association
AntiFuzz: Impeding Fuzzing Audits of Binary Executables [link]Paper   link   bibtex   196 downloads  
GRIMOIRE: Synthesizing Structure while Fuzzing. Blazytko, T.; Aschermann, C.; Schlögel, M.; Abbasi, A.; Schumilo, S.; Wörner, S.; and Holz, T. In Heninger, N.; and Traynor, P., editor(s), 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, pages 1985–2002, 2019. USENIX Association
GRIMOIRE: Synthesizing Structure while Fuzzing [link]Paper   link   bibtex  
  2017 (3)
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. Abbasi, A.; Holz, T.; Zambon, E.; and Etalle, S. In Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pages 437–448, 2017. ACM
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers [link]Paper   doi   link   bibtex  
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. Green, B.; Krotofil, M.; and Abbasi, A. In Thuraisingham, B.; Bobba, R. B.; and Rashid, A., editor(s), Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017, pages 57–67, 2017. ACM
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks [link]Paper   doi   link   bibtex  
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; and Etalle, S. In Yan, Z.; Molva, R.; Mazurczyk, W.; and Kantola, R., editor(s), Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings, volume 10394, of Lecture Notes in Computer Science, pages 694–709, 2017. Springer
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems [link]Paper   doi   link   bibtex   1 download  
  2016 (1)
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. Abbasi, A.; Hashemi, M.; Zambon, E.; and Etalle, S. In Havârneanu, G. M.; Setola, R.; Nassopoulos, H.; and Wolthusen, S. D., editor(s), Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, volume 10242, of Lecture Notes in Computer Science, pages 1–12, 2016. Springer
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation [link]Paper   doi   link   bibtex   3 downloads  
  2014 (1)
On Emulation-Based Network Intrusion Detection Systems. Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; and Etalle, S. In Stavrou, A.; Bos, H.; and Portokalidis, G., editor(s), Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings, volume 8688, of Lecture Notes in Computer Science, pages 384–404, 2014. Springer
On Emulation-Based Network Intrusion Detection Systems [link]Paper   doi   link   bibtex  
  2011 (1)
A gray-box DPDA-based intrusion detection technique using system-call monitoring. Jafarian, J. H.; Abbasi, A.; and Sheikhabadi, S. S. In Potdar, V. M., editor(s), The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pages 1–12, 2011. ACM
A gray-box DPDA-based intrusion detection technique using system-call monitoring [link]Paper   doi   link   bibtex