- ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers, Ali Abbasi, Thorsten Holz, Emmanuele Zambon, and Sandro Etalle, Proceedings of the 33nd Annual Conference on Computer Security Applications (ACSAC), 2017, San Juan, PR, USA.
- On the Significance of Process Comprehension for Conducting Targeted ICS Attacks, Benjamin Green, Marina Krotofil, Ali Abbasi, Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, November 2017, Dallas, USA.
- μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle, International Conference on Network and System Security, August 2017, Helsinki, Finland.
- Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation, Ali Abbasi, Majid Hashemi, Emmanuele Zambon and Sandro Etalle, Proceedings of the 11th International Conference on Critical Information Infrastructures Security, October 10-12, 2016, Paris, France.
- On Emulation-Based Network Intrusion Detection Systems, Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, and Sandro Etalle, Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defences (RAID), September 17-19, 2014, Gothenburg, Sweden (Video Available).
- Advanced HTML5 Exploitation Techniques, Sungbai Sun, Ali Abbasi, Zhuge Jianwei, CNCC CCF China National Computer Congress (CNCC201200118), October 2012, Dalian, China.
- A Gray-Box DPDA-Based Intrusion Detection Technique Using System-Call Monitoring, Jafar Hadi Jafarian, Ali Abbasi, Siavash Safaei Sheikhabadi, The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), Sep 2011, Perth, WA, Australia.
- Embedded Security from Software to Hardware, Ali Abbasi, International NCSC One Conference, National Cyber Security Centrum, April 2017, Hague, The Netherlands.
- Security Controls & Vulnerabilities in Embedded System OS, Ali Abbasi, S4xEurope, Jun 2017, Vienna, Austria.
- Ghost in the Machine: Challenges in Embedded Binary Security, Jos Wetzels, Ali Abbasi, USENIX Enigma, January 2017, Oakland, CA, USA.
- Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack, Ali Abbasi, Majid Hashemi, Chaos Communication Congress (33C3), December 2016, Hamburg, Germany.
- Wheel of Fortune: Analyzing Embedded OS Random Number Generators, Jos Wetzels, Ali Abbasi, Chaos Communication Congress (33C3), December 2016, Hamburg, Germany.
- Defeating Pin Control in Programmable Logic Controllers, Ali Abbasi, Majid Hashemi, ZeroNights, November 2016, Moscow, Russia.
- Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit, Ali Abbasi, Majid Hashemi, Black Hat Europe, November 2016, London, United Kingdom (Video Available).
- APTs Way, Evading your EBNIDS, Ali Abbasi, Jos Wetzels, Black Hat Europe, October 2014, Amsterdam, The Netherlands (Video Available).
- Project IRUS: A Multifaceted Approach to Attacking and Defending ICS, Ali Abbasi, Dillon Beresford, Digital Bond’s SCADA Security Scientific Symposium (S4), Jan 2013, Miami, USA
- Ghost Domain Names in Iran, Introduction to 0day attack against DNS servers, Ali Abbasi, Haixin Duan, Alireza Danesh, Sharif University Cyber Security Awareness Conference, November 2012, Tehran, Iran (Presentation became public at October 2016, since all mentioned vulnerable servers are now patched).
- Critical Infrastructure Vulnerability Assessment and Protection from Protocol Layer to Hardware Layer, Ali Abbasi, Master thesis, Tsinghua University, Jun 2013, Beijing, China.