Currently a research engineer at Inria, I am interested in the impact of abstraction barriers (software/mathematics, hardware/software) on the security of computing systems.
Physical attacks (side-channels and fault injection) are the most obvious manifestations of this impact.
In the LHS lab, our physical attack benches allow us to exhibit vulnerabilities that are not achievable with software only.
Microarchitectural security is my second research axis, where I try to conciliate better core performance and security.
Research Engineer, 2017-
Post-doc, 2016-2017
Research Engineer, 2014-2016
PhD in computer science, 2014
CEA-Leti/-TECH and UVSQ
PhD in computer science, 2014
CEA-Leti/-TECH and UVSQ
Engineering School, 2011
Mon, Sep 13, 2021, TASER
Wed, Sep 8, 2021, FIC
Wed, Apr 14, 2021, RISC-V Security Forum
Tue, Feb 18, 2020, Séminaire Sécurité à l’Interface Logiciel/Matériel
Tue, Nov 12, 2019, ENS Rennes seminar
Wed, Oct 16, 2019, PHISIC2019
Thu, May 23, 2019, JAIF2019
Fri, May 10, 2019, Séminaire Sécurité des Systèmes Électroniques Embarqués
Tue, Sep 19, 2017, CRiSIS 2017
Fri, Jul 21, 2017, ISSISP 2017 - Summer school
Sparkbench is a tool to perform physical attacks. It will orchestrate the apparatus and data retrieval. With automatic error recovery.
The data (code, docs, …) for the INRIA Faustine platform for Electromagnetic fault injection
A wrapper library to access the pcsc lib from the rust language