μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle , 2nd International Workshop on Security of the Internet of Everything, August 2017, Helsinki, Finland.
Ghost in the Machine: Challenges in Embedded Binary Security, Jos Wetzels, Ali Abbasi , USENIX Enigma, January 2017, Oakland, CA, USA.
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit, Ali Abbasi, Majid Hashemi, Black Hat Europe, November 2016, London, United Kingdom.
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation, Ali Abbasi, Majid Hashemi, Emmanuele Zambon and Sandro Etalle, Proceedings of the 11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France.
APTs Way, Evading your EBNIDS, Ali Abbasi, Jos Wetzels, Black Hat Europe, October 2014, Amsterdam, The Netherlands.
On Emulation-Based Network Intrusion Detection Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, and Sandro Etalle, Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defences (RAID), September 17-19, 2014, Gothenburg, Sweden.
Project IRUS: A Multifaceted Approach to Attacking and Defending ICS, Ali Abbasi, Dillon Beresford, Digital Bond’s SCADA Security Scientific Symposium (S4), Jan 2013, Miami, USA
A Gray-Box DPDA-Based Intrusion Detection Technique Using System-Call Monitoring, Jafar Hadi Jafarian, Ali Abbasi, Siavash Safaei Sheikhabadi, The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), Sep 2011, Perth, WA, Australia.
Advanced HTML5 Exploitation Techniques, Sungbai Sun, Ali Abbasi, Zhuge Jianwei, CNCC CCF China National Computer Congress (CNCC201200118), October 2012, Dalian, China.
Ghost Domain Names in Iran, Introduction to 0day attack against DNS servers, Ali Abbasi, Haixin Duan, Alireza Danesh, Sharif University Cyber Security Awareness Conference, November 2012, Tehran, Iran (Presentation became public at October 2016, since all mentioned vulnerable servers are now patched).
Critical Infrastructure Vulnerability Assessment and Protection from Protocol Layer to Hardware Layer, Ali Abbasi, Master thesis, Tsinghua University, Jun 2013, Beijing, China.