Currently a research engineer at INRIA-RBA, I am interested in the impact of abstraction barriers (software/mathematics, hardware/software) on the security of computing systems.
Physical attacks (side-channels and fault injection) are the most obvious manifestations of this impact.
In the LHS lab, our physical attack benches allow us to exhibit vulnerabilities that are not achievable with software only.
Research Engineer, 2017-
Post-doc, 2016-2017
Research Engineer, 2014-2016
PhD in computer science, 2014
CEA-LETI/-TECH and UVSQ
PhD in computer science, 2014
CEA-LETI/-TECH and UVSQ
Engineering School, 2011
Tue, Nov 12, 2019, ENS Rennes seminar
Wed, Oct 16, 2019, PHISIC2019
Thu, May 23, 2019, JAIF2019
Fri, May 10, 2019, Séminaire Sécurité des Systèmes Électroniques Embarqués
Tue, Sep 19, 2017, CRiSIS 2017
Fri, Jul 21, 2017, ISSISP 2017 - Summer school
Thu, Jan 26, 2017, Conference on cybersecurity WG6
Tue, Nov 22, 2016, C&ESAR 2016
Mon, Jul 4, 2016, Cyber in Bretagne - Summer School
Sparkbench is a tool to perform physical attacks. It will orchestrate the apparatus and data retrieval. With automatic error recovery.
The data (code, docs, …) for the INRIA Faustine platform for Electromagnetic fault injection
A wrapper library to access the pcsc lib from the rust language