I’m assistant professor in Software and System Security (S3) group at EURECOM, previously post-doctoral researcher in the same group since July 2022. Before joining EURECOM, I obtained a PhD in Computer Science from Institut National des Sciences Appliquées (INSA) Toulouse. My PhD thesis is titled “Offensive and defensive approaches for wireless communication protocols in IoT”. I’m a former student of INSA Toulouse and TLS-SEC, where I studied Computer Science, Networks and Security. My research interests are related to wireless security, IoT security and embedded systems security. My main contributions are:
I am the main maintainer of Mirage, an offensive framework for wireless communication protocols. |
|
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy ControllersProceedings of the 2024 ACM Asia conference on Computer and Communications Security (ASIACCS).
ESPwn32: hacking with ESP32 system-on-chipsWOOT 2023, 17th IEEE Workshop on Offensive Technologies, co-located with IEEE S&P 2023, 25 May 2023, San Francisco, United States.
Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, 7-9 June 2023, Rennes, France.
OASIS: un framework pour la détection d'intrusion embarquée dans les contrôleurs Bluetooth Low EnergySymposium sur la sécurité des technologies de l'information et des communications (SSTIC 2022), Jun 2022, Rennes, France.
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chipsIEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan.
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connectionsIEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan.
[DEMO] A defensive man-in-middle approach to filter BLE packets14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abu Dhabi, United Arab Emirates.
[POSTER] Cross-protocol attacks: weaponizing a smartphone by diverting its Bluetooth controller14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abu Dhabi, United Arab Emirates.
Attaques inter-protocolaires par détournement du contrôleur Bluetooth d'un téléphone mobileGT Sécurité des Systèmes, Logiciels et Réseaux, May 2021, Online, France.
InjectaBLE : injection de trafic malveillant dans une connexion Bluetooth Low EnergySymposium sur la sécurité des technologies de l'information et des communications (SSTIC 2021), Jun 2021, Rennes, France.
A PSD-based fingerprinting approach to detect IoT device spoofing25th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2020), Dec 2020, Perth, Australia.
WazaBee : attaque de réseaux Zigbee par détournement de puces Bluetooth Low EnergySymposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2020), Jun 2020, Rennes, France.
Mirage: towards a Metasploit-like framework for IoT2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany.
Mirage : un framework offensif pour l'audit du Bluetooth Low EnergySymposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France.
Analyse et instrumentation de piles protocolaires embarquées: retour d’expérience et perspectivesSéminaire sur la Sécurité des systèmes électroniques embarqués (SemSecuElec), January 2024
Weaponizing ESP32 RF StacksToulouse Hacking Convention (THCon), April 2023
Cross-protocol attacks, weaponizing a smartphone by diverting its Bluetooth controllerToulouse Hacking Convention (THCon), April 2022
Exploiting wireless keyboards for fun and profitToulouse Hacking Convention (THCon), June 2021
OASISOasis is a lightweight modular framework allowing to easily write, build and patch instrumentation modules for Bluetooth Low Energy (BLE) controllers using standard C language.
MirageMirage is a powerful and modular framework dedicated to the security analysis of wireless communications.
RadiosploitAndroid application allowing to sniff and inject Zigbee, Mosart and Enhanced ShockBurst packets on a Samsung Galaxy S20.
InjectaBLECustom firmware for nrf52840-dongle, allowing to easily eavesdrop Bluetooth Low Energy communications and perform multiple active attacks based on InjectaBLE strategy.
WazaBeeWazaBee is an attack allowing to transmit and receive 802.15.4 packets by diverting Bluetooth Low Energy chips.