Research
Wireless Modulation Identification: filling the gap in IoT networks security auditInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Lausanne (Switzerland), July 2024
Poster: Experimentation platform for repeatable security analysis in IoT heterogeneous environments17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Seoul (Korea), May 2024
Short Paper: The Security Analysis of a BLE Connected Health DeviceEuropean Congress Embedded Real Time Systems (ERTS), Toulouse (France), June 2024
Dynamic Binary Firmware Analysis With avatar²,Toulouse Hacking Convention 2023 (THCon), Toulouse (France), April 2023
Thesis: Improving Hardware-in-the-loop Dynamic Security Testing For Linux-based Embedded DevicesEURECOM, Biot (France), March 2023
BEERR: Bench of Embedded system Experiments for Reproducible ResearchWorkshop on on the Security of Software / Hardware Interfaces (co-located with EuroS&P'22), Genoa (Italy), July 2022
Services
I appreciate to be involved in the community through various roles. Replicability is crucial in computer science to ensure research results are reliable and verifiable. My involvement in Artifact Evaluation Committees is a way to contribute to this goal.
- Artifact Evaluation Committee, 18th USENIX WOOT Conference on Offensive Technologies (WOOT) in 2024
- Program Committe, Toulouse Hacking Convention (THCon) in 2024
- Local Organizing Committee, 42nd International Conference on Computer Safety, Reliability and Security (SafeComp) in 2023
- Artifact Evaluation Committee, 31st USENIX Security Symposium in 2022
-
Artifact Evaluation Committee, 35th & 36th Annual Computer Security Applications Conference (ACSAC) in 2019 and 2020