Vincent Cheval. Curriculum Vitae. Research



Similar documents
Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, Villetaneuse, France.

Curriculum Vitae EDUCATION. Research Interests. Mahsa Shirmohammadi

How to prove security of communication protocols?

The University of Birmingham School of Computer Science. Research Student Monitoring Group Report 2

Electronic Voting Protocol Analysis with the Inductive Method

How To Understand The Theory Of Network Routing In A Computer Program

Ph.D., Particle Physics Theory Thesis title: FCNC Processes of B and K Mesons from Lattice QCD University of Edinburgh October 1995 July1999

Le vote électronique : un défi pour la vérification formelle

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Optimised Realistic Test Input Generation

Thomas Jeanjean Associate Professor of Accounting, HEC School of Management

MODELLING, AUTHORING AND PUBLISHING THE DOCUMENT ANALYSIS LEARNING OBJECT

Curriculum Vitae. Claude Barral Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France

Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

CURRICULUM VITAE. Roberta Dessí

1 Profile of Qualifications

Marcin Witkowski Adam Mickiewicz University Homepage: mw/

The Eighth International Conference INCOSE_IL Formal Methods Security Tools in the Service of Cyber Security

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK

Cyber Security in the University of Oxford: Collaborating without Conforming?

Constraint Programming. Master Parisien de Recherche en Informatique

Fanny Dos Reis. Visiting Assistant Professor, Texas A&M University. September May 2008

Emmanuel Comte Curriculum Vitae

How To Write A Network Protocol For A Cell Phone Network

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting

Séjours dans des centres de recherche

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014

Curriculum Vitae. Positions

Curriculum Vitae of. Vicky G. Papadopoulou

Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters

Europass Curriculum Vitae

Why Cryptosystems Fail. By Ahmed HajYasien

CURRICULUM VITAE. Sonali Sen Gupta

SKEMA PhD. > PhD in Strategy, Programme & Project Management

Master of Arts (French Studies) M.A. (French Studies)

Curriculum vitae. July 2007 present Professor of Mathematics (W3), Technische

Argumentación en Agentes Inteligentes: Teoría y Aplicaciones Prof. Carlos Iván Chesñevar

Smart Secure Devices & Embedded Operating Systems

Europass Curriculum Vitae

Min Si. Argonne National Laboratory Mathematics and Computer Science Division

Formation à l ED STIC ED STIC Doctoral education. Hanna Klaudel

Girne American University Foundation English School Curriculum Vitae

Energy efficiency in HPC :

Programming the Flowoid NetFlow v9 Exporter on Android

CURRICULUM VITÆ. Education. Latest update : August Sanjay Ramassamy Graduate student at Brown University.

Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves

Curriculum Vitae. 1 Person Dr. Horst O. Bunke, Prof. Em. Date of birth July 30, 1949 Place of birth Langenzenn, Germany Citizenship Swiss and German

INRIA, Evaluation of Theme Sym A

DIRECTOR : Professor Alain AYACHE

LEXICAL OF LANDSCAPE EUROPEAN DOCTORAL STUDIES (IN THE PROCESS OF VALIDATION)

Curriculum Vitae. Personal Details. Education. Qualifications. Professor Andrew Mountford. Nationality

Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London

Dr. STYLIANI KLEANTHOUS LOIZOU CURRICULUM VITAE

M. Lamine BA Post-doc fellow

STUDY BUSINESS IN PARIS! EXPAND YOUR HORIZONS!

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Detailed CV Ph.D. degree, Télécom Bretagne, Brest, France. Evolutionary Computation, Combinatorial Optimization, Human-Computer Interaction

Curriculum Vitae. Géraldine Heilporn

Curriculum Vitae et Studiorum Dossier n Cinzia Di Giusto

A Secure Model for Medical Data Sharing

Information Security Basic Concepts

Curriculum Vitæ. David Pichardie. 29D avenue du Bois Labbé Rennes France.

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11

DR AYŞE KÜÇÜKYILMAZ. Yeditepe University Department of Computer Engineering Kayışdağı Caddesi Istanbul Turkey

CURRICULUM VITAE SPENCER BACKMAN

Master s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area

Curriculum Vitae Emmanuel Comte

THOURAYA TRIKI PERSONAL DETAILS. Address: Date of Birth: April 9 th, 1976 Citizenships: Tunisian, Canadian

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

SOPHIE MOINAS IAE TOULOUSE. Université Toulouse 1 Capitole. CRM, Toulouse School of Economics, IDEI

Curriculum Vitae. Professor Paul Lescot

Standardization of Components, Products and Processes with Data Mining

Welcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou

CURRICULUM VITAE. Igor V. Maslov Sasazuka, Shibuya-ku Phone: +81 (80) Web:

Curriculum Vitae of Paola Boito

Antonino Freno. Curriculum Vitae. Phone (office): Office: +33 (0)

Dr. Waleed A. Alrodhan (Biographical Sketch)

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

Laurea Degree (M.Sc. equivalent) in Computer Science 25 July 2002

MATTEO RIONDATO Curriculum vitae

Call for applications

CURRICULUM VITAE Stéphane VILLENEUVE

12/06/2014. Kim Bartlett, Director of Admissions Laurens Verkade, Graduate Admissions Specialist. ARUCC, 15 juin 2014

Curriculum Vitae. Personal data. Work Experience

Transcription:

Vincent Cheval School of Computing University of Kent Canterbury, CT2 7NF, UK +44 (0)7479 555701 +44 (0)1227 823816 vincent.cheval@icloud.com homepage: www.cs.kent.ac.uk/ vc218/web Nationality : French 2015 Present Curriculum Vitae Lecturer, School of Computing, University of Kent, Canterbury,UK. 2014 Postdoctoral fellow, Laboratoire lorrain de recherche en informatique et ses applications, Nancy, FR. 2013 2014 Postdoctoral fellow, University of Birmingham, Birmingham, UK. 2009 2012 PhD student, Laboratoire Spécification et Vérification (LSV), ENS Cachan & CNRS, Cachan, FR. Automatic verification of cryptographic protocols: privacy-type properties Co-advisors Hubert Comon-Lundh and Stéphanie Delaune PhD defence: December 3th, 2012 2006-2009 Normalien, École Normale Supérieure de Cachan, Cachan. 2009: Master in computer science, Master Parisien de Recherche en Informatique, with distinction 2007: Licence in computer science, with high distinction 2003-2006 Student in preparatory school, Lycée Henri Wallon, Valenciennes. Topics Tools Research Automatic verification of cryptographic protocols applications: certificate management, RFID protocols, electronic voting, secure emails, cloud computing, etc. equivalence properties: anonymity, privacy, unlinkability, strong secrecy, accountability, etc. Participation to the development of three tools. APTE: Sole developer of APTE (Ocaml language, around 13000 lines), the first tool that can decide the trace equivalence between protocols possibly nondeterministic, containing possible else branches, and for a bounded number of sessions. Url of the tool: http://projects.lsv.ens-cachan.fr/apte/ ProVerif: Participation to the development of an extension of ProVerif (Ocam language) allowing ProVerif to prove more observational equivalences. Url of the tool: http://prosecco.gforge.inria.fr/personal/bblanche/proverif/ Adecs: Sole developer of Adecs (Ocaml language, around 6000 lines), a tool that can decide the symbolic equivalence between two constraint systems. Url of the tool: http://www.cs.bham.ac.uk/~chevavfp/tools/adecs/

Publications International journals with review committee [J1] Vincent Cheval, Véronique Cortier, and Stéphanie Delaune. Deciding equivalence-based properties using constraint solving. In: Theoretical Computer Science 492 (June 2013), pages 1 39. International conferences with review committee [C1] [C2] [C3] [C4] [C5] [C6] [C7] [C8] [C9] Myrto Arapinis, Vincent Cheval, and Stéphanie Delaune. Composing security protocols: from confidentiality to privacy. In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST 15). Lecture Notes in Computer Science. To appear. Springer Berlin Heidelberg, 2015. Vincent Cheval and Véronique Cortier. Timing attacks: symbolic framework and proof techniques. In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST 15). Lecture Notes in Computer Science. To appear. Springer Berlin Heidelberg, 2015. Vincent Cheval. APTE: an Algorithm for Proving Trace Equivalence. In: Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14). Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014. Vincent Cheval, Stéphanie Delaune, and Mark Ryan. Tests for establishing security properties. In: Revised Selected Papers of the 9th International Symposium on Trustworthy Global Computing (TGC 14). Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014, pages 82 96. Vincent Cheval and Bruno Blanchet. Proving More Observational Equivalences with ProVerif. In: Proceedings of the 2nd International Conference on Principles of Security and Trust (POST 13). Volume 7796. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013, pages 226 246. Vincent Cheval, Véronique Cortier, and Antoine Plet. Lengths may break privacy or how to check for equivalences with length. In: Proceedings of the 25th International Conference on Computer Aided Verification (CAV 13). Volume 8044. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013, pages 708 723. Myrto Arapinis, Vincent Cheval, and Stéphanie Delaune. Verifying privacy-type properties in a modular way. In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 12). IEEE Computer Society Press, 2012, pages 95 109. Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 11). ACM Press, 2011, pages 321 330. Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Automating security analysis: symbolic equivalence of constraint systems. In: Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR 10). Volume 6173. Lecture Notes in Artificial Intelligence. Springer-Verlag, 2010, pages 412 426. Other publications [A1] [A2] Vincent Cheval. Automatic verification of cryptographic protocols: privacy-type properties. Thèse de doctorat. Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. Vincent Cheval. Algorithme de décision de l équivalence symbolique de systèmes de contraintes. Rapport de Master. Master Parisien de Recherche en Informatique, Paris, France, September 2009.

[A3] Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. A decision procedure for proving observational equivalence. In: Preliminary Proceedings of the 7th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo 09). 2009. Report [R1] [R2] [R3] Vincent Cheval, Stéphanie Delaune, and Hubert Comon-Lundh. A procedure for deciding symbolic equivalence between sets of constraint systems. In: Information and Computation (2015). Submitted. Rohit Chadha, Vincent Cheval, and Ştefan Ciobâcă. Automated verification of equivalence properties of cryptographic protocols. 2014. Vincent Cheval, Mark Ryan, and Jiangshan Yu. DTKI: Distributed transparent key infrastructure. 2014. Collaborations & visits 2014 One-year post-doctoral stay at Laboratoire lorrain de recherche en informatique et ses applications (France), in the team CASSIS headed by Michaël Rusinowitch. 2013 One-year post-doctoral stay at University of Birmingham (UK), in the team of Mark Ryan. 2011-2013 Several stay in LORIA (Nancy, France) in the team CASSIS to collaborate with Véronique Cortier. 2011-2012 Stay of three months from September to December 2011 at École Normale Supérieure de Paris under the supervision of Bruno Blanchet and several visits at INRIA Paris- Rocquencourt in 2012 to collaborate with Bruno Blanchet. 2009 Stay of three months from april to june in the laboratory AIST of Tokyo, Japon, during the internship of my master degree. Teaching Lectures at École Normale Supérieure de Cachan. 2010-2012 Cours de programmation pour la préparation à l agrégation. (64H) 2010 Programmation en JAVA (16H) 2010 TP programmation - Dpt. électronique électrotechnique automatique (16H) 2011-2012 Projet programmation - Licence 3 Dpt. informatique(32h) January 2013 - April 2014 Supervision of student PhD students Jiangshan Yu, Improving Public Key Certification Systems with co-advisor Mark Ryan Dissemination 2013 Discovery of a new attack on the protocols of the electronic passport. Article in Journal du CNRS, September-October 2013, number 274, page 9, http://www.cnrs.fr/ins2i/spip.php?article521 Boxed text in Pour la Science, special number on Big-bang numérique, November 2013, number 433, page 77

September 6th April 11th April 5th April 2nd March 19th February 22th February 5th October 30th Talks and seminars Several talks for working groups at LSV and University of Birmingham. Year 2014 Conference TGC 2014, Roma, Italy - Tests for establishing security properties Conference TACAS 2014, Grenoble, France - APTE: an Algorithm for Proving Trace Equivalence Workshop HotSpot 2014, Grenoble, France - Timing attacks: symbolic framework and proof techniques Seminar LORIA, Nancy, France DTKI, a new formalised PKI with no trusted parties Year 2013 Conference POST 2013, Rome, Paris - Proving more observational equivalences with ProVerif Seminar INRIA Paris-Rocquencourt, Paris, France - Automatic tools to prove privacytype properties Second Workshop on Formal Methods And Tools for Security (FMATS2), Cambridge, UK - 5 min talk : Tools for proving equivalence. Year 2012 ANR project meeting ProSe, Paris, France - Verifying privacy-type properties in a modular way. July 26th Seminar School of Computer Science, University of Birmingham, Birmingham, UK - Proving more observational equivalences with ProVerif. June 25th November 11th October 18th October 13th September 5th June 27th December 10th July 19th June 18th Conference CSF 2012, Harvard University, Cambridge MA, USA - Verifying privacytype properties in a modular way. Year 2011 Seminar LORIA, Nancy, France - Decision procedure for trace equivalence. Conference CCS 2011, Chicago, IL, USA - Decision procedure for trace equivalence. Seminar LIENS, Paris, France - Decision procedure for trace equivalence. Workshop SecCo 2011, Aachen, Germany - Decision procedure for trace equivalence. Conference CSF 2011, Vaux de Cernay, France - 5 min talk : Decision procedure for trace equivalence. Year 2010 General meeting of project ANR AVOTE, Cachan, France - A decision procedure for proving trace equivalence (Work in progress) Conference IJCAR, Edimbourg, Scotland - A decision procedure for proving symbolic equivalence. Workshop SeCret 2010, Valence, Spain - A decision procedure for proving symbolic equivalence.

Workshops and conferences Program committees 5th Workshop on Formal Methods for Security, Tunis, Tunisia, June 23rd, 2014 3rd CryptoForma workshop, Royal Holloway University of London, September 12th, 2013 Conference organization Member of the organization committee of the 24th IEEE Computer Security Foundations Symposium (CSF 11) (90 attendees), June 2011 Article reviews Papers for the following workshops and conferences: CCS 2011, FOSSACS 2013, CSF 2013, CCS 2013, POST 2014,CCS 2014, CSF 2014, ESORICS 2014, FMS 2014, ICALP 2014, HotSpot 2014,STM 2014, POST 2015, AsiaCCS 2015 Papers for the following journals: Journal of Automated Reasoning, Journal of Symbolic Computation, Journal of Computer Security Administrative tasks 2013 Organiser of the Security Seminar in the School of Computer Science, University of Birmingham 2012 Development of the database and web API for the human ressources in the Laboratoire Spécification et Vérification. Programming skills Basic Intermediate Advanced python PHP, html, java, FStar Ocaml, C, C++, L A TEX Languages French Mothertongue English Advanced Conversationally fluent