Ali Abbasi

Orcid: 0000-0003-4220-6560

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Ruhr University, Bochum, Germany (former)
  • University of Twente, Enschede, The Netherlands (former)


According to our database1, Ali Abbasi authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

2023
Space Odyssey: An Experimental Software Security Analysis of Satellites.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Loki: Hardening Code Obfuscation Against Automated Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

Nyx-net: network fuzzing with incremental snapshots.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.
Proceedings of the 29th USENIX Security Symposium, 2020

Ijon: Exploring Deep State Spaces via Fuzzing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
AntiFuzz: Impeding Fuzzing Audits of Binary Executables.
Proceedings of the 28th USENIX Security Symposium, 2019

GRIMOIRE: Synthesizing Structure while Fuzzing.
Proceedings of the 28th USENIX Security Symposium, 2019

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2017
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Proceedings of the Network and System Security - 11th International Conference, 2017

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation.
Proceedings of the Critical Information Infrastructures Security, 2016

2014
On Emulation-Based Network Intrusion Detection Systems.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2011
A gray-box DPDA-based intrusion detection technique using system-call monitoring.
Proceedings of the 8th Annual Collaboration, 2011


  Loading...