Welcome to Eric Filiol's Official Webpage

I am currently heading the Operational Cryptography and Computer Virology lab (C + V)O which is currently hosted by ESIEA in Laval, France. The 2014 research activity report for the lab is available here.
I am also the editor-in-chief of the research journal Journal in Computer Virology and Hacking Techniques, published by Springer Verlag.
I am the GostCrypt Project leader and the DAVFI project architect and designer, a new generation anti-malware solution.

My credo: "Never trust a politician. A political party is a good idea gone bad/(Ne jamais faire confiance à un homme politique. Un parti politique est une bonne idée qui a mal tourné)"

You can also read my posts on the (C + V)O blog
My curriculum vitae is here.
My research deals with
  • Symmetric encryption: design and evaluation of symmetric cryptosystems, design of cryptosystems with trapdoors (introduction of undetectable mathematical weaknesses allowing a less complex cryptanalysis for anyone who has knowledge of the trapdoor), cryptanalysis of symmetric cryptosystem based on the combinatorial properties (weaknesses) of those systems, reconstruction techniques of unknown algorithms (coding or encryption) using the intercepted stuff only (encoded streams, encrypted messages).
  • Analysis and design of steganographic systems. Encrypted data (COMSEC aspect only) exhibit a (too) typical statistical profile. Consequently any attacker can therefore easily identify an exchange of encrypted data. It is therefore crucial in some contexts to hide the very existence (storage, exchange) of data. It is the role of steganography (hiding the channel by considering the TRANSEC aspect). From a dual point of view, I am also interested in techniques for detecting steganographic contents (steganalysis). 
  • Computer virology: formal characterization of viral techniques (known and unknown techniques), study and design of new malware technologies, formalization and design of new antiviral techniques, malicious cryptography and steganography (potential use of encryption and/or steganographic techniques by Malware and use of malicious codes for applied cryptanalysis purposes), analysis and Evaluation (passive and active) of antivirus software.

  • Analysis and technical studies of the concept of computer warfare

efiliol at netc.fr