Energy
Anne-Cécile Orgerie, CNRS
Storage
Jalil Boukhobza, LabSTICC, ENSTA
Privacy
Tristan Allard, Univ. Rennes 1, IRISA
Networks
Martin Heusse, LIG, Université Grenoble Alpes
Security
Aurore Fass, Inria, Sophia Antipolis
Machine learning
Elisa Fromont, Irisa, Rennes
Software engineering
Romain Robbes, LaBRI, Université de Bordeaux
04:00pm Bus leaves Grenoble train station towards Le Pleynet
Evaluating the energy consumption and environmental impacts of distributed systems
Abstract: Distributed systems are increasingly spanning worldwide, with digital services hosted all around the globe and often belonging to complex systems, utilizing many other services and hardware resources themselves. Along with this increase comes an alarming growth of energy consumption and carbon footprint. Despite the distributed systems’ complexity, understanding how they consume energy is important in order to hunt wasted Joules and reduce their environmental impacts.
Bio: Anne-Cécile Orgerie is research scientist in computer science at CNRS in the IRISA laboratory in Rennes. She belongs to a team working on large-scale distributed systems, including Cloud and Edge computing. Her research topics focus on measuring, modeling, simulating and reducing the energy consumption of distributed systems, and more broadly on evaluating and limiting their environmental impacts.
07:00pm Welcome reception + drink
07:30–08:45am Breakfast
Session 1 - Storage
Session chair: Stéphan Plassart
09:00–10:00am Keynote: Jalil Boukhobza
A Decade of Research on Cloud Systems: A Retrospective
Abstract: This presentation looks back on ten years of research on cloud systems. It explores how to improve the management of data and task placement across diverse and heterogeneous environments combining different types of storage and computing resources. The work focuses on developing methods to monitor, analyze, and optimize the use of these resources, relying on models of cost, performance, and prediction. By integrating approaches from operation research and artificial intelligence, the research aims to make cloud infrastructures more efficient, adaptive, and sustainable.
Bio: Jalil Boukhobza (Senior Member, IEEE) received the electrical engineering (with Hons.) degree from the Institut Nationale d’Electricite et d’electronique (I.N.E.L.E.C) Boumerdes, Algeria, in 1999, and the M.Sc. and Ph.D. degrees in computer science from the University of Versailles, France, in 2000 and 2004, respectively. He is a Full Professor with the ENSTA, a French State Graduate, Post-Graduate and Research Institute part of Institut Polytechnique de Paris. He was a research fellow with the PRiSM Laboratory (University of Versailles) from 2004 to 2006. He was an associate professor with the University Bretagne Occidentale, Brest, France, from 2006 to 2020 and is a member of Lab-STICC lab. He has also been working with the Technology Research Institute (IRT) bcom since 2013. He is leading the SHAKER (Software/HArdware and unKnown Environment inteRactions) team of the Lab-STICC (more than 50 staff members) working on various topics related to optimization of software / hardware systems according to the constraints and hazards related to their environment. He lead more than 10 projects related to storage systems and published over a hundred papers on the topic.
His main research interests include storage system design, performance evaluation and energy optimization, and operating system design. He works on different application domains such as embedded systems, cloud computing, database systems and high performance computing.
10:15–10:30am: Break
10:30–12:15am: Student presentations
Rémy RAES - Less is More: a Lossy Storage Middleware for Multivariate Time Series
Belkis DJEFFAL - PLB: Priority-Aware Load Balancing for Replicated Databases under Constrained Resources
Tara AGGOUN - Volimap : Optimizing Key-Value Store Performance by Leveraging User-Space Page Tables
Elyas EL IDRISSI - Study of New Erasure Codes and Their Impact on Large-Scale Distributed Storage Systems
Jana TOLJAGA - VoliStorM: Virtualization-Driven Storage Management for Crash-Consistent Systems
Nevena VASILEVSKA - A software-controlled hardware cache for memory disaggregation
Hua JUNRUI - Adaptive Republish Timing for IPFS Provider Records Under Node Churn
12:15–04:30pm: Lunch & free time
04:15–04:30pm: Coffee break
Session 2 - Energy
Session chair: Etienne Le Louët
04:30pm - 05:30pm: student presentations
Nathan LEBLOND Characterising Energy Measurement Tools in Practice
Kellian LEVEQUE Assessing Power Usage Effectiveness in Serverless Computing Environments
Robin CHAUSSEMY Modeling HPC Jobs and Resources to Minimize Energy Loss
Ifechukwu EJIOFOR The environmental impact of high availability in cloud data centers
05:30pm - 07:30pm: Social Event
07:45pm Social Dinner - "Raclette au feu de bois"
07:30–08:30am Breakfast
Session 3 - Privacy
Session chair: Rémy Raes
08:45–10:00am Keynote: Tristan Allard
Privacy-preserving computation of spectral centrality measures over distributed graphs: to perturb, or to encrypt, is that the question?
Abstract: Graph datasets, representing entities and their relationships, are now pervasive. Many graphs contain personal data and are partitioned across multiple data centers according to the geographical locations of users or to the entity in charge of storing and managing the data. For example, financial transaction graphs are spread over different institutions (banks or financial entities), and large-scale social networks are managed centrally but stored in geographically distributed infrastructures. Computing centrality measures, e.g., for identifying the most important nodes in a graph, is useful for a wide range of applications, including fake news prevention, disease spreading prevention, or fraud detection. However, when the graph is distributed over mutually distrustful parties or falls under data protection laws (e.g., the GDPR in EU, the CCPA in California), centralizing it for performing global computation is restricted by legal, contractual, or reputation constraints. The goal of this talk is to show how computing spectral centrality measures over such distributed graphs can be performed while providing strong privacy guarantees, high utility, and affordable performances. Secure multi-party computation is a common approach to this problem but hardly scales with the number of parties. Alternative approaches based on additively-homomorphic encryption lack generality and can support only a few spectral centrality measures. We overcome these limitations by proposing two novel approaches. When performances prevail over utility and privacy, we propose PGPregel, the first approach based on differentially private perturbation mechanisms for computing spectral centrality measures over a partitioned graph. When utility and privacy prevail over performances, we propose POPPY, the first approach to the same problem based on the CKKS fully homomorphic encryption scheme. In this talk, we will discuss both approaches and their respective tradeoffs, and, stepping back, analyze how the use of differential privacy and homomorphic encryption as security building blocks impact graph processing.
Bio: Tristan Allard is a maître de conférences since September 2014 at Univ Rennes, IRISA. He defended his habilitation à diriger les recherches thesis (HDR for short) in April 2024 about his contributions to privacy-preserving data intensive systems. Before that, he was a postdoctoral researcher at the Inria Zenith team in Montpellier. He conducted his Ph.D. thesis in Computer Science in the Inria SMIS team and received it from the University of Versailles in December 2011. The volume, variety, and velocity of digital personal data are increasing at a fast pace. Enabling both daily uses and large-scale analysis of personal data while preserving individuals' privacy is a key challenge in building a knowledge society. His research interests lie within this wide field. He is particularly interested in the combination of differential privacy with cryptography (privacy-preserving data querying, privacy-preserving crowdsourcing, privacy-preserving data mining) and has been diverted a few years ago by the study of browser fingerprints for web authentication.
10:00–10:15am: Break
10:15–12:00am: Student presentations
Michael ANOPRENKO DAGs for the Masses
Lamyae HASSINI LAMP: An Efficient Approach for Fault Detection in Distributed Systems
Nathan RABIER Handling dynamics constraints and deadlines in distributed software reconfiguration
Victor Henrique DE MOURA NETTO Active Sybil Attack and Efficient Defense Strategy in IPFS DHT
Marc SANCHEZ DNSSPE : A DNSSEC based protocol for Secure Zero-Touch Provisioning and Enrollment of IoT devices
Karim LAOUCHEDI Vers des politiques de contrôle d’usage pour régir l’usage et le partage des données dans les environnements crosscloud
Riwan COËFFIC-QABALI Selective and Partial Memory Replication for NUMA systems
12:00–04:30pm: Lunch (Pincerie mountain restaurant) & free time
04:30–05:00pm: Coffee break
Session 4 - Networks
Session chair : Stéphane Delbruel
05:00–06:15pm Keynote: Martin Heusse
LPWAN Challenges
Abstract: LPWAN (Low Power Wide Area Networks) are a relatively new type of communication technology characterized by i) low power consumption of the devices, ii) low cost, iii) cellular-like communication range and iv) extremely low data rates (you knew there was catch, right?). We will talk about the various available technologies in this field and see what kind of research we can make in this area. For instance, one important question is capacity: how many nodes can a gateway accommodate before too many packets are lost? But what is too many losses, for a start? Even though LPWAN networks are simple technologies, they raise many research questions.
Bio: Martin Heusse is Professor at Grenoble INP Graduate schools of Engineering and Management, Université Grenoble Alpes, since 2010 and a member of the LIG (Grenoble Computer Science Laboratory) laboratory. He graduated from Telecom Bretagne engineering school in 1996, received his PhD in 2001 and Habilitation (HDR) in 2009 from Université Joseph Fourier (Grenoble). His main research interests are wireless LANs, sensor networks, LPWAN, Routing in data networks and transport protocols performance. M. Heusse has published more than 80 research papers in journals or peer-reviewed conferences.
06:15pm - 07:45pm: student presentations
Augustin BONNEL A LoRa 2.4 GHz mesh network in a Flying Ad-Hoc Network for Search And Rescue operations, design and on-going work
Bisma SAJID Communication Architectures for Data Offloading from Heterogeneous Satellite Constellations in Low-Earth Orbits
Clara CIOCAN A Memoryless Stream Processing Architecture for Energy-Efficient Signal Computation
Hugo LEDIRACH MANET Routing for Collaborative Robot Missions
Augustin LAOUAR Rethinking geolocation on the Internet
Etienne LE LOUET Kestrel: An efficient in-kernel DDoS mitigation system
07:45pm Dinner
07:30–08:45am Breakfast
Session 5 - Security
Session chair : Antoine Boutet
08:30–09:45pm Keynote: Aurore Fass
On the Security and Privacy Risks of Browser Extensions
Abstract: Browser extensions are popular to enhance user browsing experience: they offer additional functionality to Web users, such as ad blocking, grammar checks, or password management. To operate, browser extensions need **elevated privileges** compared to Web pages, making them an attractive target for attackers and a significant threat to Web users' security and privacy.
However, many aspects of browser extensions have not been investigated yet. For instance: how can extensions put the security and privacy of Web users at risk? How many dangerous extensions have been in the Chrome Web Store? How can we detect dangerous extensions?
In this presentation, I will address these questions by first defining several classes of "dangerous extensions" and the ways they can harm users. In particular, I will focus on detecting _vulnerable_ extensions, i.e., those that may unintentionally expose sensitive user data. Then, I will consider _malicious_ extensions, i.e., those which deliberately engage in malicious activities like malware distribution, and discuss the underlying challenges of machine learning-based detection systems. Finally, I will show how browser extensions can be _fingerprinted_: simply using an extension can introduce observable side effects, which can be abused to track users on the Web.
Overall, this talk aims to raise awareness about the security and privacy risks posed by browser extensions and to discuss strategies for mitigating these threats.
Bio: Aurore Fass is a Tenured Researcher at the Inria Centre at University Côte d'Azur (France). She got her Ph.D. from CISPA Helmholtz Center for Information Security & Saarland University (Germany) in 2021. From 2021--2023, she was a Visiting Assistant Professor of Computer Science at Stanford University (U.S.); from 2023--2025, she was a Tenure-Track Faculty at CISPA.
Aurore's research broadly focuses on Web Security & Privacy and Web Measurements. Specifically, she designs practical approaches to protect the security and privacy of Web users. She builds systems to proactively detect malicious JavaScript code and suspicious browser extensions.
Aurore is currently serving as USENIX Security 2026 Artifact Evaluation co-chair. She also co-chaired the MADWeb 2024 & 2023 workshop editions, co-located with NDSS. In addition, she has served on the program committees of the leading security and privacy conferences and has received Distinguished Reviewer Awards and Recognitions at ACM CCS 2025 & 2023 & 2022, USENIX Security 2025, ACSAC 2024 & 2023, EuroS&P 2024, and TheWebConf 2022.
09:45–10:15am: Student presentations
Harhad Ahlem Federated Learning–Based Semi-Supervised IDS for Medical IoT
Vasisht Duddu Trustworthy Deployment of Machine Learning Systems
10:15–10:30am: Break
10:30–12:00am: Student presentations
Harena RAKOTONDRATSIMA Using Fork-Nox to protect an application
Jean-François DUMOLLARD Fork-nox: A new virtualization technique for practical system security
Mohamed TOUAHRIA Towards Green Security in IoT: A Taxonomy of Energy Measurement Techniques for IoT Security Mechanisms
Martin RAYNAUD Design and conception of a System-In-Package (SiP) at cryogenic temperatures
Paul BORGARD Cryogenics and instrumentation in quantum systems
Yanis FORMERY Rethinking Verifiability in Federated Learning through a Hybrid TEE–ZKP Architecture
12:00–04:30pm: Lunch & free time
04:30–05:00pm: Coffee break
Session 6 - Machine Learning
Session chair: Leo Mendiboure
05:00–06:15pm Keynote: Elisa Fromont
IA & ML : Comprendre, Expliquer et S'adapter au Temps
Abstract: Je commencerai par replacer l’apprentissage automatique dans son contexte historique, avant d’aborder deux défis majeurs qui limitent aujourd’hui sa confiance et son adoption : l’explicabilité des modèles et leur capacité à s’adapter à des données qui évoluent dans le temps. Je vous expliquerai comment rendre les décisions d’un algorithme plus compréhensibles, notamment grâce à des méthodes post-hoc comme LIME ou SHAP. Ensuite, je vous montrerai comment concevoir des systèmes capables d’apprendre en continu sans oublier leurs connaissances passées, tout en gérant les dérives conceptuelles. À travers des exemples concrets, je vous ferai découvrir ces enjeux clés du machine learning moderne, entre transparence, efficacité et adaptation dynamique.
Bio: I am a full professor at Université de Rennes France, since 2017 and a Junior member of the Institut Universitaire de France (IUF) (2019-2024). I work at IRISA research institute where I am the head of the Inria MALT ("Machine Learning with Temporal Constraints") team.
From 2008 until 2017, I was associate professor at Université Jean Monnet in Saint-Etienne, France. I worked at the Hubert Curien research institute in the Data Intelligence team.
I received my Research Habilitation (HDR) in 2015 from the University of Saint-Etienne.
From 2006 until 2008 I was a postdoctoral researcher in the Machine Learning group of the KU Leuven, Belgium.
I received my PhD in 2005 from Université de Rennes 1.
06:15pm - 08:30pm: student presentations
Andrew MARY HUET DE BAROCHEZ DAHL: Distributed, Arbitrary and Heterogeneous Learning
Aymene BOUCHA Federated Learning: State of the Art and Current Challenges
Viet Minh Thong LE Towards a Programmable Autonomic Platform for Decentralized Learning: PANM-Based Neighbor Selection for P2PFL
Matthieu SILARD Decentralized Residential Flexibility Management System via Advanced Metering Infrastructure
Irina SAMUS Energy-aware actor-based distributed programming
Thomas BOULANGER AI methods for magnetic image reconstruction
Simon ARTUS Cloud-to-IoT continuum : Exploring and extending the symbiosis of continuum tools
Ahmed RJIBA Decentralized and Market-Based Application Orchestration in Fog and IoT Environments
Haraesh JAYASETHU RAMACHANDRAN Fog and Edge Computing: Performance Benchmarking, Performance Optimization
08:30pm: dinner
07:30–08:15am Breakfast
Session 7 - Software Engineering
Session chair: Gil Utard
08:30–09:45am Keynote: Romain Robbes
LLMs, Agents, and their adoption in Software Engineering
Abstract: Since the arrival of ChatGPT three years ago, Large Language Models (LLMs) are having a large impact on our lives. Since 2025, we see the signs of a transition from base LLMs to more autonomous reasoning models and agents; this is particularly visible in Software Engineering, where the past year saw the release of a large number of coding agents. The talk will start with a high-level introduction of how LLMs work, covering the various training stages (pre-training, instruction following, reasoning) and the inference phase (including some optimizations). I will then explain how LLM-based agents work, covering topics such as harnesses, tool calling, and the agentic loop, and taking coding agents as an example. Finally, I will talk about a recent empirical study in which we study the adoption of coding agents on GitHub. In this study, we mine more than 100,000 GitHub repositories to identify traces of coding agents, allowing us to quantify the adoption, as well as finding out in which contexts adoption is more prevalent.
Bio: I am a Senior Scientist (Directeur de Recherche) at the CNRS, working at the LaBRI and hosted by the University of Bordeaux, since February 2023. Before that I was: an Associate Professor at the Free University of Bozen-Bolzano, (2017–2023); an Assistant, then Associate Professor at the University of Chile’s Computer Science Department (2010–2017); a Ph.D. student, then post-doc, at the University of Lugano (2004–2009). My research interests are in Empirical Software Engineering, Mining Software Repositories, Software Maintenance and Evolution, and the intersection of Machine Learning with Programming Languages and Software Engineering. Find out more about me here.
09:45-10:15am: Break
During the break, you must:
put down your bed sheets and bring them to the dedicated space, at the entrance of the residence;
make a towel pile in your room;
bring your luggage to the amphitheater;
give back your keys.
Thanks!
10:15–11:15am: Student presentations
Nada ZINE Variability in and with Large Language Models (LLMs)
Valentin RICHARD SkyData: Intelligent and autonomous data with green behaviours
Gaetan NODET A Fast Inter-Process and VM Communication System based on User-Interrupts
Brice Arleon ZEMTSOP AdaptiFlow: An Extensible Framework for Event-Driven Autonomy in Cloud Microservices
11:20–12:30pm: Lunch
12:30pm: Bus leaves the school towards Grenoble train station (ETA: 15h00)