EN FR
EN FR


Section: Dissemination

Teaching - Supervision - Juries

Certification

The master degree program "Mastère Spécialisé en Cybersécurité" has received the SecNumedu label. This label testifies that this program meets the requirements of a charter that has been jointly established by ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information) and various actors (administrations, companies, ...) of the domain. This label was awarded during the annual Forum International de la Cybersécurité (FIC) in January 2017 at Lille.

Teaching

  • Master: Emmanuelle Anceaume, Research in Computer Science - Distributed Algorithms, 20 hours of lecture, M2; Université Rennes 1, France;

  • Licence: Christophe Bidan, Algorithms and Data Structures, 36 hours of lecture including 7.5 hours of lectures, L3 - first year of the engineering degree, CentraleSupélec, France;

  • Licence: Christophe Bidan, Software Engineering, 12 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Licence: Christophe Bidan, Supervision of student project, 1 project, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Master: Christophe Bidan is responsible for the module Secured information systems, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Christophe Bidan, Applied cryptography, 6 hours of lecture, M2 - master 2 degree, University of Rennes 1, France;

  • Master: Christophe Bidan, Applied cryptography, 15 hours including 6 hours of lecture, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master : Christophe Bidan, Cryptographic Protocols, 6 hours of lecture, mastère CS (Cyber Security), CentraleSupélec, France;

  • Master: Christophe Bidan, Information systems, 4.5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Christophe Bidan, Supervision of student project, 2 projects, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Licence: Gilles Guette, Algorith and Complexity, 28 hours, L1 - Licence, ISTIC/University of Rennes, France;

  • Licence: Gilles Guette, Network Initiation, 57.5 hours, L3 - Licence, ISTIC/University of Rennes, France;

  • Licence: Gilles Guette, Network Initiation, 41.5 hours, L3 - first year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Network Routing, 32 hours, M1 - second year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Mobile Network Routing, 5 hours, M1 - second year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Advanced Network Services, 10 hours, M1 - second year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Network Project, 24 hours, M1 - second year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Security, 28 hours, M1 - second year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Network and System Security, 12 hours, M2 - third year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Network Modeling, 18 hours, M2 - third year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Sensors Network, 30 hours, M2 - Master, ISTIC/University of Rennes, France;

  • Master: Gilles Guette, Supervision of student, Contrat de professionnalisation, M2 - third year of the engineer degree, ESIR, France;

  • Master: Gilles Guette, Supervision of student internship, M2 - ISTIC/University of Rennes, France;

  • Licence: Guillaume Hiet, Algorithms and Data Structures, 12.5 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Computer security and privacy for the engineer, 8 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Buffer overflow vulnerabilities, 16 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Buffer overflow vulnerabilities, 16 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;

  • Master: Guillaume Hiet, Pentest, 19 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Pentest, 3 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;

  • Master: Guillaume Hiet, Introduction to Linux, 3 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;

  • Master: Guillaume Hiet, Java Security, 4.5 hours, M2 - Mastère Spécialisé CS, CentraleSupélec, France;

  • Master: Guillaume Hiet, Linux Security, 18 hours, M2 - Mastère Spécialisé CS , CentraleSupélec, France;

  • Master: Guillaume Hiet, Linux Security, 7.5 hours, third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, LDAP, 7.5 hours, third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Intrusion Detection, 15 hours, M2 - Mastère Spécialisé CS, CentraleSupélec, France;

  • Master: Guillaume Hiet, Intrusion Detection, 13.5 hours, M2 - third year of the engineer degree, M2 research degree of University of Rennes 1, CentraleSupélec, France;

  • Master: Guillaume Hiet, Security Monitoring, 3 hours, M2, cycle "Sécurité Numérique", INHESJ, France;

  • Master: Guillaume Hiet, Computer Security, 31.5 hours, M2, Mastère Spécialisé Architecte des Systèmes d'Information, CentraleSupélec, France;

  • Master: Guillaume Hiet, Intrusion Detection, 16 hours, M2, University of Rennes 1, France;

  • Master: Guillaume Hiet, Intrusion Detection, 10 hours, M2 - third year of the engineer degree, ESIR, France;

  • Master: Guillaume Hiet, Intrusion Detection, 9 hours, M2, Université of Limoges, France;

  • Master: Guillaume Hiet, Firewall, 6 hours, M2, University of Rennes 1, France;

  • Master: Guillaume Hiet, Supervision of student project, 4 projects, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Supervision of student project, 2 projects, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Hiet, Supervision of student project, 2 projects, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;

  • Master:Jean-François Lalande, Legal aspects of information security, 3.5 hours, M2 - master CyberSecurity, CentraleSupélec, France;

  • Master: Guillaume Hiet, Android Malware, 3.5 hours, M2, Mastère Spécialisé CS (Cyber Security), France;

  • Master: Jean-François Lalande, Supervision of student project, 2 projects, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Jean-François Lalande, Supervision of student project, 2 projects, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Jean-François Lalande, Supervision of student project, 1 projects, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;

  • Licence : Ludovic Mé, Software Engineering, 18 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Licence : Ludovic Mé, Software Engineering tutorials, 6 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Licence : Ludovic Mé, Software Engineering and Java development, 18 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Master : Ludovic Mé, Information systems tutorials, 6 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master : Ludovic Mé, Supervision of student project, 1 project, 38 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Licence: Guillaume Piolle, Software engineering, 1.5 hours, L3 - first year of the engineering degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Modelling, Algorithms and Programming, 22 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Computer security and privacy, 5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Software project, 3.5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Relational databases, 6 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Computer networks, 30 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Security Policies, 4.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Java programming, 4.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Computer networks, 9 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Software engineering, 12 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Network Access Control, 9 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Web development, 32 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Privacy protection, 18 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Computing project, 60 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Guillaume Piolle, Legal aspects of information security, 4.5 hours, M2 - master CyberSecurity, CentraleSupélec, France;

  • Licence : Eric Totel, Foundations of computer science, data structures and algorithms, 9 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Licence : Eric Totel, Software Modeling, 15 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Master : Eric Totel, Operating Systems, 30 hours, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master : Eric Totel, C language, 24 hours including 6 hours of lecture, M2 - master CS (Cyber Security), CentraleSupélec, France;

  • Master : Eric Totel, C language and C++ language, 12 hours including 6 hours of lecture, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master : Eric Totel, Dependability , 9 hours including 7.5 hours of lecture, M2 - third year of the engineer degree and master research, CentraleSupélec, France;

  • Master : Eric Totel, Dependability, 3 hours of lecture, M2 - third year of the engineer degree (ingénierie des systèmes automatisés), CentraleSupelec, France;

  • Master : Eric Totel, Dependability, 4.5 hours of lecture, M2 - post-graduate training (master Architecture des Réseaux de Communication), CentraleSupélec, France;

  • Master : Eric Totel, Intrusion Detection, 6 hours of lecture, M2 - M2 - master CS (Cyber Security), CentraleSupélec, France;

  • Master : Eric Totel, Intrusion Detection, 9 hours of lecture, M2 - master 2 degree, University of Rennes 1, France;

  • Master : Eric Totel, Supervision of student project, 4 projects, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master : Eric Totel, Supervision of student project, 1 project, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Licence: Frédéric Tronel, Software engineering, 40 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Licence: Frédéric Tronel, Operating Systems, 12 hours, L3 - first year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel is responsible of the M2 degree in CyberSecurity (mastère spécialisé), organized jointly by CentraleSupélec and Institut Mines Télécom (IMT) Atlantique, France;

  • Master: Frédéric Tronel, Operating systems, 21 hours hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Compilers, 18 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Automatic reasoning, 4.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Assembly Language, 6 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Buffer overflow vulnerabilities (theory and practice), 20.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Firewall, 15 hours, M2 - third year of the engineer degree, CentraleSupélec, France;

  • Master: Frédéric Tronel, Calculability in distributed systems, 6 hours, M2, jointly with University of Rennes 1 and CentraleSupélec, France;

  • Master: Frédéric Tronel, Computer network, 8 hours, M2, jointly with University of Rennes 1 and CentraleSupélec, France;

  • Licence : Valérie Viet Triem Tong, Algorithms and Data Structures, 36 hours of lecture including 7 hours of lectures, L3 - first year of the engineering degree, CentraleSupélec, France;

  • Licence : Valérie Viet Triem Tong, Supervision of student project, 6 projects of 2nd year of the engineer degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Games Theory, 18 hours, M1 - second year of the engineering degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Formal Methods, 9 hours, M2 - third year of the engineering degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Intrusion detection using information flow control, 9 hours, M2 / third year of the engineering degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Programming in Java, 12 hours, M1 - international students (NplusI) second year of the engineering degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Small elements of decidability, 7.5 hours, M2 - third year of the engineering degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Supervision of student project, 1 project, mastere CS (Cyber Security), CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Supervision of student project, 8 projects, M1 - second year of the engineer degree, CentraleSupélec, France;

  • Master : Valérie Viet Triem Tong, Supervision of student project, 1 project year of the engineer degre, CentraleSupélec, France;

  • Doctorant : Valérie Viet Triem Tong, Malware analysis by OS information flow tracking, 2 hours, Summerschool - Cyber in Berry, Bourges, France;

Supervision

Theses defended in 2017
  • PhD: Laurent Georget, Suivi de flux d'information correct pour les systèmes d'exploitation Linux, Octobre 2017, supervised by Mathieu Jaume (25% - MdC LIP6), Guillaume Piolle (25%), Frédéric Tronel (25%), and Valérie Viet Triem Tong (25%);

  • PhD: Deepak Subramanian, Multi-level Information Flow Monitoring, started in January 2013, supervised by Christophe Bidan (20%) and Guillaume Hiet (80%);

  • PhD: Antoine Guellier, Utilisation de la cryptographie homomorphe pour garantir le respect de la vie privée, started in October 2013, supervised by Christophe Bidan (50%) and Nicolas Prigent (50%);

  • PhD: Kun He, Mise en œuvre de techniques de droit à l’oubli pour les contenus numériques, started in October 2013, supervised by Christophe Bidan (50%) and Gaetan LeGuelvouit (50% - IRT B-Com);

  • PhD: Solenn Brunet, Privacy-preserving location-based services, started in October 2014, supervised by Christophe Bidan(40%), Sébastien Gambs (30%) and Jacques Traoré (30% - Orange Labs Caen);

  • PhD: Florian Grandhomme, Protocole de routage externe type BGP dans un environnement réseaux tactiques adhoc mobiles : faisabilité et performances, started in October 2014, supervised by Gilles Guette (50%), Adlen Ksentini (25% - Eurecom), and Thierry Plesse (25% - DGA MI).

Theses in progress
  • PhD in progress: Mouna Hkimi, Détection d’intrusion dans les systèmes distribués, started in October 2013, supervised by Eric Totel (50%) and Michel Hurfin (50%);

  • PhD in progress: Thomas Letan, Contribution à la sécurité des couches basses des systèmes d’information, started in January 2015, supervised by Guillaume Hiet (50%), Pierre Chifflier (25% - ANSSI), and Ludovic Mé (25%);

  • PhD in progress: Damien Crémilleux, Visualisation d’évènements de sécurité pour la supervision, started in October 2015, supervised by Christophe Bidan (30%), Nicolas Prigent (35%), and Frédéric Majorczyk (35% - DGA MI);

  • PhD in progress: Mourad Leslous, Déclenchement automatique de codes jugés suspects dans les applications Android, started in October 2015, supervised by Thomas Genet (20% - Celtique Inria project), Jean François Lalande (40% - INSA Centre Val de Loire), and Valérie Viet Triem Tong (40%);

  • PhD in progress: Mounir Nasr Allah, Contrôle de flux d’information par utilisation conjointe d’analyse statique et d’analyse dynamique accélérée matériellement, started in November 2015, supervised by Guillaume Hiet (75%) and Ludovic Mé (25%);

  • PhD in progress: Pernelle Mensah, Adaptation de la Politique de Sécurité guidée par l’Évaluation du Risque dans les Infrastructures de Communication modernes, started in January 2016, supervised by Eric Totel (25%), Guillaume Piolle (25%), Christine Morin (25% - Myriad Inria project), and Samuel Dubus (25% - Nokia);

  • PhD in progress: David Lanoë, Détection d’intrusion dans les applications distribuées : l’approche comportementale comme alternative à la corrélation d’alertes, started in october 2016, supervised by Michel Hurfin (50%) and Eric Totel (50%);

  • PhD in progress: Aurélien Trulla, Caractérisation de malware Android par suivi de flux d’information et nouvelles techniques d’évasion, started in October 2016, supervised by Jean Louis Lanet (25% - Tamis Inria project) and Valérie Viet Triem Tong (75%);

  • PhD in progress : Ronny Chevalier , “Enhanced computer platform security through an intrusion-detection approach”, started in November 2016, supervised by Guillaume Hiet (50%), Boris Balacheff (25% - HP), and Ludovic Mé (25%);

  • PhD in progress: Laetitia Leichtnam, Visualisation pour la caractérisation d’événements de sécurité, started in october 2016, supervised by Eric Totel (40%), Nicolas Prigent (30%) and Ludovic Mé (30%);

  • PhD in progress : Charles Xosanavongsa, Combining Attack Specification and Dynamic Learning from traces for correlation rule generation, started in december 2016, supervised by Eric Totel (50%) and Ludovic Mé (50%);

  • PhD in progress : Pierre Graux, Security of Hybrid Mobile Applications, started in october 2017, supervised by Valérie Viet Triem Tong (50%) and Jean-Francçois Lalande (50%);

  • PhD in progress : Vasile Cazacu, Calcul distribué pour la fouille de données cliniques, started February 2017, supervised by Emmanuelle Anceaume (50%) and Marc Cuggia (50%)

  • PhD in progress : Aurélien Dupin, Secure multi-partie computations, started February 2016, supervised by Christophe Bidan(40%), David Pointchavalm (30% - ENS) and Renaud Dubois (30% - Thales).

Supervision of external PhD candidates
  • LL. D. (Doctor of Laws) in progress: Gustav Malis, Droit à l'effacement des données mises à disposition par les personnes elles-mêmes, started in March 2014, supervised by Annie Blandin (80% - IODE) and Guillaume Piolle (20%);

  • PhD in progress: Oualid Koucham, Détection d’intrusions pour les systèmes de contrôle industriels, started in January 2015, supervised by Stéphane Mocanu (50% - Gipsa-lab), Guillaume Hiet (25%), and Jean-Marc Thiriet (25% - Gipsa-lab);

  • PhD in progress : Yves Mocquard, Population protocols, started in september 2015, supervised by Bruno Sericola (Dyonisos Inria project) and Emmanuelle Anceaume;.

Juries

Ludovic Mé was a member of the PhD committee for the following PhD and HDR thesis:

  • Pierre Laperdrix, Browser Fingerprinting: Diversity to Augment Authentication and Build Client-side Countermesures, INSA of Rennes, 03/10/2017 (President of the Jury);

Ludovic Mé has reported the following PhD thesis:

  • Pierre Parrend, Emergent Industrial Ecosystems, University of Strasbourg, 12/12/2017.

Christophe Bidan was a member of the PhD committee for the following PhD thesis:

  • Jean Aimé Maxa, Architecture de communication sécurisée d’une flotte de drones, Université Toulouse 3 Paul Sabatier (UT3 Paul Sabatier), 28/06/2017;

  • Eric Asselin, Système de détection d'intrusion adapté au système de communication aéronautique ACARS, Institut National Polytechnique de Toulouse (INP Toulouse), 28/06/2017 (reviewer);

Jean-François Lalande has reported the following PhD thesis:

  • Julien Hatin, Evaluation de la confiance dans un processus d'authentification, 24/11/2017.

Eric Totel was a member of the PhD commitee for the following PhD thesis:

  • Giannakou Anna, Self-Adaptable Security Monitoring for IaaS Cloud Environments, 06/07/2017 (President of the Jury).

  • Yacine Hebbal, Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud, 18/09/2017 (President of the Jury).

Valérie Viet Triem Tong has reported the following PhD thesis:

  • Franck de Goer de Herve, Rétro-ingénierie de programmes binaires en une exécution - une analyse dynamique légère basée au niveau des fonctions, 10/20/2017.