I am a Lecturer, member of the Security Group at University of Kent, UK.
My main area of research is verification of security protocols. More specifically, I am interested in automating verification of privacy type properties related to RFID protocols, rooting protocols in ad-hoc network, electronic voting protocols, etc. I am working on extending the decision procedure APTE to handle cryptographic primitives such as exclusive or, blind signature, homomorphic functions, etc. Moreover, I'm also working on integrating side-channel attacks in automatic procedures as well as establishing modularity results for equivalence properties.
On the other hand, I am also looking into cloud computing security. In particular, I'm interested in creating a formal model adapted to protocol relying on the cloud as well as a model allowing us to characterise accountable system specific to authorities maintaining the cloud.
Updated the 21/01/2015
Two new conference paper at POST 2015 on my publication page.
- Composing security protocols: from confidentiality to privacy.
- Timing attacks: symbolic framework and proof techniques.
I've started a new Lecturer position in the Security Group at University of Kent.
A new publication is added on my publication page:
- A conference paper at TGC 2014: Tests for establishing security properties.