I am a Ph.D. candidate of Distributed and Embedded System Security group at University of Twente, Netherlands since November 2013, under the supervision of professor Sandro Etalle . Currently, I am a visiting research scholar at the Chair for Systems Security of Ruhr University Bochum , Germany, under the supervision of professor Thorsten Holz . My research interests involve Embedded Systems Security mostly related to Industrial Control Systems and Real-Time Operating Systems. I received my master degree in Computer Science from Tsinghua University , Beijing, China in 2013. I was working there on Programable Logic Controller (PLC) security in Network Security Lab, Microprocessor and SoC Technology R&D center with the grant from National 863 High-Tech Program of China. I was involved in CRISALIS European Union project (FP7) related to Critical Infrastructure Protection at University of Twente. In the same time, I was involved in Project AVATAR for on the fly detection and containment of unknown malware and Advanced Persistent Threats. Before that, I was working as Head of Vulnerability Analysis and Penetration Testing Group at Computer Security Incident Response Team at the Sharif University of Technology in Tehran, Iran.
Programmable Logic Controllers
Data Storage Equipment
Green, B., Krotofil, M., & Abbasi, A. (2017). On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. In CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 57-67). Association for Computing Machinery. DOI: 10.1145/3140241.3140254
Abbasi, A., Holz, T., Zambon, E., & Etalle, S. (2017). ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. In ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 (pp. 437-448). Association for Computing Machinery. DOI: 10.1145/3134600.3134618
Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E., & Etalle, S. (2017). μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings (pp. 694-709). ( Lecture Notes in Computer Science; Vol. 10394). Springer International. DOI: 10.1007/978-3-319-64701-2_55
Abbasi, A., & Hashemi, M. (2016). Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. In Black Hat Europe (pp. 1-35). United Kingdom: Black Hat.
Abbasi, A. (2016). Ghost in the PLC: stealth on-the-fly manipulation of programmable logic controllers’ I/O. (CTIT Technical Report Series; No. TR-CTIT-16-02). Enschede: Centre for Telematics and Information Technology (CTIT).
Abbasi, A., Wetzel, J., Bokslag, W., Zambon, E., & Etalle, S. (2014). On Emulation-Based Network Intrusion Detection Systems. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 384-404). (Lecture Notes in Computer Science; Vol. 8688). Switzerland: Springer. DOI: 10.1007/978-3-319-11379-1_19
Google Scholar Link
Embedded Binary Security
News on utwente.nl