Main publications of my current and past research activities

Wireless networks privacy

Wireless tracking systems

  • Le traçage cyberphysique des personnes et la vie privée, Annales des Mines, 2021. [link]
  • Analysing the privacy policies of Wi-Fi trackers, Workshop on Physical Analytics, ACM, 2014 [link]
  • I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques 2013 [link]
  • Large Scale Wi-Fi tracking using a Botnet of Wireless Routers. Workshop on Surveillance & Technology, 2015. [link]

Address randomization and device reidentification

  • Device re-identification in LoRaWAN through messages linkageACM WiSec 2022 [link]
  • Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. ACM AsiaCCS 2016 . [pdf]
    • DEMO: Panoptiphone: How Unique is Your Wi-Fi Device? ACM WiSec 2016. [link]
  • Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous, 2019 [link]
  • Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing. ACM WiSec 2015, [link]
  • On the process of fixing privacy issues in Wi-Fi enabled devices WSA 2021 . [pdf]

Wireless device fingerprinting

  • Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile, IoT S&P, 2019 [link]
  • Defeating MAC Address Randomization Through Timing Attacks. ACM WiSec 2016. [link]

Personnal data exposure

  • Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy ContinuityProtocols, PETS 2020 [link]
  • Detecting smartphone state changes through a Bluetooth based timing attack, ACM WiSec, 2018 [link]
  • SSIDs in the Wild: Extracting Semantic Information from WiFi SSIDs, Local Computer Networks (LCN), 2015 [link]
  • Social links exposure

  • I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. WoWMoM 2012 [link]
  • Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive and Mobile Computing, 2013. [link]
  • Inferring User Relationship from Hidden Information in WLANs, MILCOM 2012 [link]

Contact tracing

  • DESIRE: Leveraging the best of centralized and decentralized contact tracing systems, ACM Digital Threats: Research and Practice, 2021, [link]
  • On using Bluetooth-Low-Energy for contact tracing, Research Report, 2020, [link]
  • Proximity Tracing Approaches-Comparative Impact Analysis, Research Report, 2020, [link]
  • ROBERT: ROBust and privacy-presERving proximity Tracing, Research Report, 2020, [link]
  • Analysis of Diagnosis Key distribution mechanism in contact tracing applications based on Google-Apple Exposure Notification (GAEN) framework, Research Report, 2020, [link]

General public articles (in French)

  • Tracage Wi-Fi, applications et contre-mesures Gnu/Linux Magazine HS 84 (2016) [FR] [link]
  • Smartphone, Wi-Fi et vie privée : comment votre smartphone peut se révéler être votre pire ennemi, Multi-system & Internet Security Cookbook (MISC), 8 (2013) [FR][link]
  • Quand les terminaux mobiles jouent les mouchards de poche, Podcast Interstices (2013) [FR] [link]

Mobile & IoT privacy

  • No need to ask the Android: Bluetooth-Low-Energy scanning without the location permission ACM WiSec 2022[pdf]
  • Privacy Protection for Wi-Fi Location Positioning Systems Journal of information security and applications, Elsevier 2021[pdf]
  • A Generic Information and Consent Framework for the IoT, TRUSTCOM 2019 [link]
  • Analysis of an Ultrasound-Based Physical Tracking SystemGreHack 2018[link]
  • WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android PermissionACM WiSec 2014[link]

Anonymity & Censorphip on the Internet

  • Why are they hiding ? Study of an Anonymous File Sharing System. ESTEL-SEC 2012 [link]
  • Censorship in the Wild: Analyzing Web Filtering in Syria, IMC 2014 [link]

Anonymization, Private data aggregation & analytics

  • Privacy in trajectory micro-data publishing: a surveyTransactions on Data Privacy 2020[pdf]
  • The Pitfalls of Hashing for Privacy IEEE Communications Surveys and Tutorials[pdf]
  • Privacy-preserving Wi-Fi Analytics, PETS 2018 [link]
  • Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors, IWSPA 2017 [link]
  • Private and Resilient Data Aggregation, LCN 2013 (Short Paper) [link]
  • Heterogeneous Secure Multi-Party Computation, NETWORKING 2012 [link]

Erasure correcting codes

  • Codes AL-FEC hautes performances pour les canaux à effacements : variations autour des codes LDPC, Mathieu Cunche, PhD Thesis, 2010 [link]
  • OpenFEC project: free, open, AL-FEC codes [link]