Welcome to Eric Filiol's Official Webpage

I am currently heading the Operational Cryptography and Computer Virology lab (C + V)O which is currently hosted by ESIEA in Laval, France. Research activity reports for the lab : 2014, 2015, 2016, 20172018
I am also the editor-in-chief of the research journal Journal in Computer Virology and Hacking Techniques, published by Springer Verlag.
I am the GostCrypt Project leader and the DAVFI project architect and designer, a new generation anti-malware solution.

You can also read my posts on the (C + V)O blog
My curriculum vitae is here.
My research deals with
  • Symmetric encryption: design and evaluation of symmetric cryptosystems, design of cryptosystems with trapdoors/backdoors (introduction of undetectable mathematical weaknesses allowing a less complex cryptanalysis for anyone who has knowledge of the trapdoor), cryptanalysis of symmetric cryptosystem based on the combinatorial properties (weaknesses) of those systems, reconstruction techniques of unknown algorithms (coding or encryption) using the intercepted stuff only (encoded streams, encrypted messages).
  • Analysis and design of steganographic systems. Encrypted data (COMSEC aspect only) exhibit a (too) typical statistical profile. Consequently any attacker can therefore easily identify an exchange of encrypted data. It is therefore crucial in some contexts to hide the very existence (storage, exchange) of data. It is the role of steganography (hiding the channel by considering the TRANSEC aspect). From a dual point of view, I am also interested in techniques for detecting steganographic contents (steganalysis). 
  • Computer virology: formal characterization of viral techniques (known and unknown techniques), study and design of new malware technologies, formalization and design of new antiviral techniques, malicious cryptography and steganography (potential use of encryption and/or steganographic techniques by Malware and use of malicious codes for applied cryptanalysis purposes), analysis and Evaluation (passive and active) of antivirus software.

  • Analysis and technical studies of the concept of computer warfare
  • Critical infrastructure security analysis. Proactive analysis of terrorist attacks

My teaching activities:
  • Probability theory and Statistics course
  • Parallel and distributed computing. This includes a short introduction to bigdata computing (Hadoop & MapReduce) 
  • Data mining and Big Data applied to security and Intelligence
  • Information theory course
  • Error-correcting codes course
  • Mathematical models of security (graph theory, Boolean functions, statistical testing...)
  • Theory and pratice of blockchains
  • Cryptography and cryptanalysis
  • Open source Intelligence techniques
  • Ethics and legal regulation in security
efiliol at netc.fr