Publications
RFC9511
Some recent use cases have a need for carrying an identifier in IPv6 packets. While those drafts might perfectly make sense on their own, each document requires IANA to allocate a new code point for a new option, and so for very similar situations, which could quickly exhaust the allocation… Read more
Application Programming Interfaces, known as APIs, are increasingly popular in modern web applications. With APIs, users around the world are able to access a plethora of data contained in numerous server databases. To understand the workings of an API, a formal documentation is required. This… Read more
This thesis explores the idea of applying genetic improvement in the aim of injecting vulnerabilities into programs. Generating vulnerabilities automatically in this manner would allow creating datasets of vulnerable programs. This would, in turn, help training machine-learning models to detect… Read more
Les flaky tests sont des tests non déterministes, ils peuvent donner des résultats différents sans modification du code. Ce qui entraîne une perte de temps et de ressources.Une meilleure connaissance de ce domaine doit mener à une diminution de ces désagréments. Cependant, il y a peu de travaux… Read more
Multiple techniques exist to find vulnerabilities in code, such as static analysis and machine learning. Although machine learning techniques are promising, they need to learn from a large quantity of examples. Since there is not such large quantity of data for vulnerable code, vulnerability… Read more
Code Smells have been studied for more than 20 years now. They are used to describe a design flaw in a program intuitively. In this study, we wish to identify the impact of some of these Code Smells. And, more specifically, their potential impact on Testability. To do this, we will study the… Read more
The InterPlanetary File System (IPFS) is currently the largest decentralized storage solution in operation, with thousands of active participants and millions of daily content transfers. IPFS is used as remote data storage for numerous blockchain-based smart contracts, Non-Fungible Tokens (NFT… Read more
While IPv6 was already standardized in the 90’s, only the last decade has seen a growth in its global adoption. In addition to dealing with IPv4 addresses exhaustion, IPv6 comes with a mechanism, called IPv6 Extension Header (IPv6 EH), allowing the protocol to be more flexible and extensible.… Read more
Future 6G network will push even further the convergence of different types of mobile networks, integrating space, aerial and terrestrial access. Mobility, remains one of the most difficult aspects to tackle in this context. One approach under consideration is the use of an overlay solution able… Read more
Network Function Virtualization (NFV) is a hot topic in computer networking and aims to replace proprietary, hardware-based networking services with virtualized, cloud-based network functions. However, the current implementation of NFV Management and Orchestration (MANO) often relies on either… Read more
The IoT technology allows many types of personal data to be measured by many kinds of devices and sensors, and to be sent over the Internet for various applications. However, this data transmission has to be secure and the privacy of the users should ideally be preserved. In this work, we… Read more
Internet of Things (IoT) devices increasingly contribute to critical infrastructures, necessitating robust security measures. LoRaWAN, a low-power IoT network, employs the Advanced Encryption Standard (AES) with a 128-bit key for encryption and integrity, balancing efficiency and security. As… Read more
eBPF is a popular technology originating from the Linux kernel that enables safely running user-provided programs in a kernel-context. This technology opened the door for efficient programming in the operating system, especially in its network stack. However, its applicability is not limited to… Read more
The Internet adopts a layered architecture where IP addresses are used to identify endpoints and port numbers serves as application multiplexers over a single host. Nowadays, names are usually used to expose a service to public access. However, even with the current DNS architecture, nodes must… Read more
With a standardization process that attracted much interest, QUIC can been seen as the next general-purpose transport protocol. Still, it does not provide true multipath support yet, missing some use cases that Multipath TCP addresses. To fill that gap, the IETF recently adopted a Multipath… Read more
Concurrency theory has received considerable attention, but mostly in the scope of synchronous
process algebras such as CCS, CSP, and ACP. As another way of handling concurrency, data-based
coordination languages aim to provide a clear separation between interaction and computation by… Read moreWe design new encryption mechanisms that enable the design of the first universally verifiable voting schemes, supporting both receipt-freeness and everlasting privacy without assuming the existence of an anonymous channel.
Our schemes support the two most traditional election tallying… Read more
Concurrency theory has received considerable attention, but mostly in the scope of synchronous
process algebras such as CCS, CSP, and ACP. As another way of handling concurrency, data-based
coordination languages aim to provide a clear separation between interaction and computation by… Read morePart of the Embedded Cryptography Textbook
The proliferation of cybercrime and the escalating threat of malware attacks necessitate more effective and efficient analysis techniques. Traditional methods, such as static and dynamic analysis, have limitations that hinder their effectiveness against sophisticated and evasive malware.… Read more
This document specifies a multipath extension for the QUIC protocol to enable the simultaneous usage of multiple paths for a single connection.
Shaping first-year students’ minds to solve problems
at different levels of abstraction is both important and challeng-
ing. Although abstraction is a crucial skill in problem-solving,
especially in STEM subjects, students often struggle with abstract
thinking. They tend to focus… Read moreThis paper addresses the difficulties students face when learning
and practicing pointers (i.e., variables storing the memory address
of another variable as its value) in a computer programming class.
To improve their understanding and practice, we have developed
Tartare, an… Read moreThis paper focuses on a programming methodology relying
on an informal and graphical version of the Loop Invariant for building
the code. This methodology is applied in the context of a CS1 course in
which students are exposed to several C programming language concepts
and… Read more