Short Bio
I am currently a senior international consultant in the field of information and system security, cybersecurity, and intelligence techniques. I am also an associate professor at ENSIBS, Vannes, France and at National Research University Higher School of Economics. Moscow, Russian Federation (International Lab, Dept. of cybersecurity).
I am also an APM expert.
I was the head of the Operational Cryptography and Computer Virology lab (C + V)O at ESIEA in Laval, France until June 2019 as well as the head of the R&D of the ESIEA group. Research activity reports for the (C + V)O lab : 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018
I have spent 22 years in the French Army (Infantry/French Marine Corps) among nearly half in intelligence and information security positions.
I have been the scientific director of the European Institute for Computer Antivirus Research from 2007 to 2013.
I am also the editor-in-chief of the research journal Journal in Computer Virology and Hacking Techniques, published by Springer Verlag. I am the GostCrypt Project leader and the DAVFI project architect and designer, a new generation anti-malware solution.
My ORCID ID
I am a practicing Christian, member of the Christian Assembly of Paris
My curriculum vitae is here
My research deals with
Symmetric encryption: design and evaluation of symmetric cryptosystems, design of cryptosystems with trapdoors/backdoors (introduction of undetectable mathematical weaknesses allowing a less complex cryptanalysis for anyone who has knowledge of the trapdoor), cryptanalysis of symmetric cryptosystem based on the combinatorial properties (weaknesses) of those systems, reconstruction techniques of unknown algorithms (coding or encryption) using the intercepted stuff only (encoded streams, encrypted messages).
Analysis and design of steganographic systems. Encrypted data (COMSEC aspect only) exhibit a (too) typical statistical profile. Consequently any attacker can therefore easily identify an exchange of encrypted data. It is therefore crucial in some contexts to hide the very existence (storage, exchange) of data. It is the role of steganography (hiding the channel by considering the TRANSEC aspect). From a dual point of view, I am also interested in techniques for detecting steganographic contents (steganalysis).
Computer virology: formal characterization of viral techniques (known and unknown techniques), study and design of new malware technologies, formalization and design of new antiviral techniques, malicious cryptography and steganography (potential use of encryption and/or steganographic techniques by Malware and use of malicious codes for applied cryptanalysis purposes), analysis and Evaluation (passive and active) of antivirus software.
Analysis and technical studies of the concept of computer warfare
Critical infrastructure security analysis. Proactive analysis of terrorist attacks