About me
Since 2025, am an Assistant Professor at EURECOM in the software and system security (S3) group. I am broadly interested in the application of formal methods for software and hardware security, including binary analysis, secure compilation, hardware-software co-designs, microarchitectural side-channels, hardware verification, etc.
🔍 I’m looking for curious and motivated students to join me for a PhD on security at the hardware-software boundary! If that sound like you, look at this page on how to apply. I’m also looking for master-level interns who are enthusiastic about exploring research and considering a PhD.
News
- September 2025: I was in Rennes, back to where I studied more than 7 years ago, but on the other side of the classroom to give a talk about my research to students. I was so happy with the many questions and good feedbacks, thanks!
- Our paper on emulating microarchitectural weird machines has been accepted at uASC’26! Congratulations to Dries for turning an excellent master’s thesis into a strong paper
- Starting as an Assistant Professor in EURECOM in September 2025
- July 25th, 2025 was my last week at KU Leuven. Many thanks to my wonderful colleagues!
Awards and Grants
- I got awarded a 3-year Junior postdoctoral fellowship from FWO for my project Hardware-Software Co-Design for End-to-End Security.
- My PhD thesis received an award from Université Côte d’Azur.
- My PhD thesis received a distinction from the GDR Sécurité Informatique. Check the short video on their website (in French).
- In 2020, I received the fellowship “Jeunes Talents France” L’Oréal - UNESCO pour les femmes et la science for my work on automated program analysis for security. Press article from ENS-Rennes (in French).
Past Experiences and Research Visits
From 2021 to 2025, I was a postdoc at DistriNet, KU Leuven working in the group of Frank Piessens on hardware software co-designs for security. In particular, I was involved in multiple security extensions of the RISC-V Proteus Core.
I defended my thesis, Symbolic Binary-Level Code Analysis for Security , on November 12th 2021. During my PhD, I developed Binsec/Rel, a tool to efficiently analyze cryptographic constant-time and secret-erasure at binary-level; and Binsec/Haunted, a tool to detect vulnerabilities to Spectre attacks. I did my PhD at CEA List under the supervision of Sébastien Bardin and Tamara Rezk.
Before that, I received a master degree in computer science in 2018 from the ENS Rennes and the University of Rennes 1 (France).
From September to November 2019, I was a visiting researcher at Information Science Institute (ISI), University of Southern California (USC), where I worked with Christophe Hauser.
During summer 2017, I did an intership with Erik Poll and Joeri de Ruiter at Radboud University (Netherlands) on Inferring OpenVPN State Machines Using Protocol State Fuzzing .
You can have a look at my CV.