I have been working for 10 years in evaluation, research and consulting activities in the field of information systems security, both in the civilian sector and in the Defense sector.
My career plan is oriented towards research engineering, a dimension that I want to develop and deepen in the areas of operating systems security, reverse engineering and cryptography.
Having an initial academic background in Mathematical Modelling, I had the opportunity during my career to train regularly in order to explore the technical aspects necessary to my study, consulting and research missions (system, network, telecom, computer security, cryptography).
I dedicated my doctoral dissertation to the dynamic analysis of protected programs, focusing mainly on the cryptographic mechanisms resistant against reverse engineering and on the use of a virtualization system to carry through protected code reverse analysis. My research eventually led me to the definition and implementation of a test strategy dedicated to evaluation of anti-virus software.
My expertise now applies mainly to software systems and to hybrid software/hardware architectures. I want to evolve technically towards being conversant with hardware security components.
Before joining ESIEA engineering school, I worked for:
The Operational Cryptology and Virology Laboratory’s core research activity deals with computer security - mostly in virology and cryptology - in the field of defensive computing applications but in connection with offensive computer security (computer warfare).
Emphasizing both the theoretical approach - to maintain a high academic skills - and applied research inspired by problems (from the government sphere, but also from the industrial one), the main objective is not only to understand the current attacks but also and especially to predict and invent the future attacks. This proactive approach aims at anticipating the threat (defensive area) but in a context of evolution of French doctrine, to investigate towards both a theoretical and practical arsenal in the offensive area (government sphere). The key word in both areas is the operational capability.
The laboratory retains strong links not only with the Department of Defense, but also with the Departments of Justice and Interior. This applies to both the thematic part of the research activity and the creation and maintenance of a secure environment for conducting this research activity in respect of the principal regulations.
COURSE 01 : Introduction (History, overview, Classical Cryptography)
PRACTICE : Classical Cryptosystems Cryptanalysis
COURSE 02 : Symmetric Cryptography (Stream Ciphers, Information Theory, Probability & Statistics, Boolean Functions)
PRACTICE : Parallel Messages Attack [Corpus, cpcry1,cpcry2,cpcry3,cpcry4,cpcry5,cpcry6], Correlation Attack
COURSE 03 : Symmetric Cryptography (Block Ciphers, Data Encryption Standard : design & cryptanalysis)
PRACTICE : DES Differential & Linear Cryptanalysis
COURSE 04 : Symmetric Cryptography (Hash Functions, Message Authentication Code)
COURSE 05 : Asymmetric Cryptography (Algebra - Groups, Rings, Finite Fields)
COURSE 06 : Asymmetric Cryptography (RSA & El Gammal Signature & Encryption algorithms, Key Management and Cryptographic protocols)
COURSE 07 : Asymmetric Cryptography (Algorithmic Analysis & Implementation)
PRACTICE : Miller-Rabin Algorithm Implementation
REFERENCES :
[Sti95] Stinson, D.R. Cryptography: Theory and practice. CRC Press, 1995.
[Sch96] Schneier, B. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc. New York, 1996.
[Fil10] Filiol, E. How to operationaly detect misuse or flawed implementation of weak stream ciphers (and even block ciphers sometimes) and break them - Application to the Office Encryption Cryptanalysis. In Proceedings of
Black Hat EU 2010, 2010.
COURSE 01 : Introduction (Code Injection Attacks)
PRACTICE : Stack Based Buffer Overflow [Server Code], Format String attacks, Heap Based Buffer Overflow
COURSE 02 : Compiler's protection options
PRACTICE : Stack Based Buffer Overflow prevention using Compiler's protection options
COURSE 03 : Static Code Checking
PRACTICE : Stack Based Buffer Overflow prevention using PREFast
COURSE 04 : Dynamic Analysis Tools
PRACTICE : Heap Based Buffer overflow prevention using Application Verifier
REFERENCES :
[Kus07] Kuster, R. WinDbg. From A to Z!, 2007.
COURSE 01 : Introduction (Language Processing, Structure of a Compiler)
COURSE 02 : Introduction (Main Concepts and Tools)
COURSE 03 : Scanning (Lexical Analysis, Scanner Generator, Flex)
COURSE 04 : Parsing (Syntax Analysis, Parser Generator, Bison)
COURSE 05 : Intermediate Code Generation and optimization
COURSE 01 : Introduction (Course overview, Evolution of Operating Systems, Windows® and Linux Operating System Family, Concepts & Tools, Comparing the Linux and Windows® Kernels)
COURSE 02 : Concurrency (Critical Sections, Semaphores, Trap Dispatching, Interrupts, Synchronization, Inter-Process Communication)
COURSE 03 : Processes and Threads (Process and Thread Internals, Thread Scheduling)
COURSE 04 : Memory (Memory Management Fundamentals, Virtual Address Translation, Physical Memory Management)
COURSE 05 : Input/Output (Principles of IO Systems, IO System components, IO Processing)
COURSE 01 : Basis (CPU IA-32 architecture & intruction set, Windows® OS internals & PE Format)
PRACTICE : CPU IA-32 Assembler introduction
PRACTICE : Assembler Programming
PRACTICE : Windows® Internals Exploration using a Kernel Debugger
PRACTICE : Peering Inside PE Format
COURSE 02 : Software Protection (Anti-Static/Dynamic Analysis, Stealth Mechanisms, Diversification/Obfuscation, WBAC Cryptography)
PRACTICE : Tiny Relocatable Program Analysis [Ollydbg]
PRACTICE : Code Virtualization Mechanism Analysis
PRACTICE : WBAC Implementation of DES Algorithm Analysis
COURSE 03 : Reverse Engineering (Static/Dynamic Analysis Tools, Forensics & OS Instrumentation Tools, Binary Rewriting Tools, WBAC Cryptanalysis)
PRACTICE : Unpacking a Tiny Program using a user mode debugger
PRACTICE : API Hooking using Microsoft® Detours
PRACTICE : Binary Rewriting using Diablo
PRACTICE : WBAC Implementation of DES Algorithm Cryptanalysis
COURSE 04 : Malware Analysis (Virtual Machine Based Analysis Framework, Stealth Malware Analysis)
PRACTICE : A few Malwares Analysis
PRACTICE : Rootkit Manual Detection using Sysinternals® Tools Suite
REFERENCES :
[BH99] D. Brubacher and G. Hunt. Detours : Binary Interception of Win32 Functions. In Proceedings of the 3rd USENIX Windows NT Symposium, pages 135143, 1999.
[Eil05] E. Eilam. Reversing : Secrets of Reverse Engineering. Wiley Publishing, ISBN 0-7645-7481-7, 2005.
[Hog05] G. Hoglund. Rootkits : Subverting the Windows Kernel. Addison-Wesley, ISBN 0-321-29431-9, 2005.
[Intel1] Intel® 64 and IA-32 Architectures Software Developer’s Manual. Basic Architecture
[Intel2A] Intel® 64 and IA-32 Architectures Software Developer’s Manual. Instruction Set Reference (part 1/2)
[Intel2B] Intel® 64 and IA-32 Architectures Software Developer’s Manual. Instruction Set Reference (part 2/2)
[Intel3A] Intel® 64 and IA-32 Architectures Software Developer’s Manual. System Programming Guide (part 1/2)
[Intel3B] Intel® 64 and IA-32 Architectures Software Developer’s Manual. System Programming Guide (part 2/2)
[PE] Microsoft Portable Executable and Common Object File Format Specification, available at : http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx
[RS05] M.E. Russinovich and D.A. Solomon. Microsoft Windows internals : Microsoft Windows Server 2003, Windows XP, and Windows 2000. Microsoft Press, Redmond, Wash., 2005.
windbg –k com:pipe,port=\\.\pipe\com1,resets=0
Parc universitaire Laval-Changé
53000 Laval
Office A27
Login: yes Password: i dont have one password is incorrect Login: yes Password: incorrect