Welcome...

A. Abbasi (Ali)

About Me

I am a Ph.D. candidate of  Distributed and Embedded System Security  group at University of Twente, Netherlands since November 2013, under the supervision of professor  Sandro Etalle . Currently, I am a visiting research scholar at the  Chair for Systems Security of Ruhr University Bochum , Germany, under the supervision of professor  Thorsten Holz . My research interests involve Embedded Systems Security mostly related to Industrial Control Systems and Real-Time Operating Systems. I received my master degree in Computer Science from  Tsinghua University , Beijing, China in 2013. I was working there on Programable Logic Controller (PLC) security in Network Security Lab, Microprocessor and SoC Technology R&D center with the grant from National 863 High-Tech Program of China. I was involved in  CRISALIS  European Union project (FP7) related to Critical Infrastructure Protection at University of Twente. In the same time, I was involved in Project AVATAR for on the fly detection and containment of unknown malware and Advanced Persistent Threats. Before that, I was working as Head of Vulnerability Analysis and Penetration Testing Group at Computer Security Incident Response Team at the Sharif University of Technology in Tehran, Iran.

Expertise

Intrusion Detection
Programmable Logic Controllers
Embedded Systems
Polynomials
Glossaries
Arsenals
Packet Networks
Malware

Publications

Recent Articles
Green, B., Krotofil, M., & Abbasi, A. (2017). On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. In On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
Abbasi, A., Holz, T., Zambon, E., & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers
Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems (Vol. 10394, pp. 694-709). Springer International. DOI: https://doi.org/10.1007/978-3-319-64701-2_55
Abbasi, A., & Hashemi, M. (2016). Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In Black Hat Europe (pp. 1-35). United Kingdom: Black Hat.
Abbasi, A. (2016). Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. (CTIT Technical Report Series; No. TR-CTIT-16-02). Enschede: University of Twente, Centre for Telematica and Information Technology (CTIT).
Abbasi, A., & Wetzel, J. (2014). APTs way: Evading Your EBNIDS. In Black Hat Europe (pp. 1-87). Amsterdam: Black Hat.
Abbasi, A., Wetzel, J., Bokslag, W., Zambon, E., & Etalle, S. (2014). On Emulation-Based Network Intrusion Detection Systems. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 384-404). (Lecture Notes in Computer Science; Vol. 8688). Switzerland: Springer. DOI: 10.1007/978-3-319-11379-1_19

UT Research Information System

Google Scholar Link

Projects

Embedded Binary Security

News on utwente.nl

https://www.utwente.nl/ctit/archive/!/2014/10/370245/even-the-latest-malware-detection-systems-can-be-bypassed

Contact Details

Visiting Address

University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands