My current and past research activities

Wireless devices and privacy

More and more objects are equipped with wireless communications interfaces. The radio signal emitted by those devices can be easily collected and, in some cases, used to obtain private information about the owner.

Wi-Fi / 802.11

  • Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. ACM AsiaCCS 2016 . [pdf]
    • DEMO: Panoptiphone: How Unique is Your Wi-Fi Device? ACM WiSec 2016. [link]
  • Defeating MAC Address Randomization Through Timing Attacks. ACM WiSec 2016. [link]
  • Large Scale Wi-Fi tracking using a Botnet of Wireless Routers. Workshop on Surveillance & Technology, 2015. [link]
  • Analysing the privacy policies of Wi-Fi trackers, Workshop on Physical Analytics, ACM, 2014 [link]
  • I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques 2013 [link]
  • SSIDs in the Wild: Extracting Semantic Information from WiFi SSIDs, Local Computer Networks (LCN), 2015 [link]
  • Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing. ACM WiSec 2015, [link]
  • I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. WoWMoM 2012 [link]
  • Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive and Mobile Computing, 2013. [link]
  • Inferring User Relationship from Hidden Information in WLANs, MILCOM 2012 [link]

Bluetooth / BLE

  • Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy ContinuityProtocols, PETS 2020 [link]
  • Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous, 2019 [link]
  • Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile, IoT S&P, 2019 [link]
  • Detecting smartphone state changes through a Bluetooth based timing attack, ACM WiSec, 2018 [link]

General public articles (in French)

  • Tracage Wi-Fi, applications et contre-mesures Gnu/Linux Magazine HS 84 (2016) [FR] [link]
  • Smartphone, Wi-Fi et vie privée : comment votre smartphone peut se révéler être votre pire ennemi, Multi-system & Internet Security Cookbook (MISC), 8 (2013) [FR][link]
  • Quand les terminaux mobiles jouent les mouchards de poche, Podcast Interstices (2013) [FR] [link]


  • gtk-wifiscanner: a tool displaying in live information gathered from Wi-Fi probe requests.

Anonymity & Censorphip on the Internet

  • Why are they hiding ? Study of an Anonymous File Sharing System. ESTEL-SEC 2012 [link]
  • Censorship in the Wild: Analyzing Web Filtering in Syria, IMC 2014 [link]

Private data aggregation & analytics

  • Privacy-preserving Wi-Fi Analytics, PETS 2018 [link]
  • Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors, IWSPA 2017 [link]
  • Private and Resilient Data Aggregation, LCN 2013 (Short Paper) [link]
  • Heterogeneous Secure Multi-Party Computation, NETWORKING 2012 [link]

Other privacy topics

  • A Generic Information and Consent Framework for the IoT, TRUSTCOM 2019 [link]
  • The Pitfalls of Hashing for Privacy, IEEE Communications Surveys and Tutorials, [link]

Erasure correcting codes

Erasure correcting codes are a solution to make data transmissions resilient to packet loss. LDPC (low-density parity check) codes offer good erasure correction capabilities with a low en/decoding complexity.
  • Codes AL-FEC hautes performances pour les canaux à effacements : variations autour des codes LDPC, Mathieu Cunche, PhD Thesis, 2010 [link]
  • OpenFEC project: free, open, AL-FEC codes [link]