Me
| Cybersecurity |
|
| Machine Learning |
|
| Teaching and Scientific Supervision |
|
| Since 2023 |
Associate Professor Univ. Clermont Auvergne, France Critical IoT Security, ML-based attack detection:
|
| 2018 - 2023 |
Research Engineer CEA-LETI, Grenoble, France Smart-Home and Industrial IoT Security:
|
| 2014 - 2018 |
Ph.D Student Vérimag, St Martin d'Hères, France Industrial Systems Cybersecurity:
|
| Cybersecurity | SSH, Wireshark, Scapy, NMap, OpenSSL, Burp, John, Snort, Ettercap |
| Development |
Python 100%
PHP 70% C 70% LUA 30% |
| Linux | Admin (Debian, Alpine, Arch) |
| Windows | Advanced user |
| DevOps | Vim, Git, Jenkins, Virtualenv, Gitlab CI, Docker, VirtualBox, Ansible |
| Reports | LaTeX, Office and alternatives |
| Languages |
French 100%
English 80% Japanese 30% |
| 2014 - 2018 |
Ph.D in Cybersecurity Univ. Grenoble Alpes |
| 2012 - 2014 |
Master in Cybersecurity Univ. Grenoble Alpes Magna Cum Laude |
| 2009 - 2014 |
Magister in Computer Science Univ. Grenoble Alpes Summa Cum Laude |
| 2009 - 2012 |
Bachelor in Computer Science Univ. Grenoble Alpes Cum Laude |
| [2] | M. Puys. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques. Ph.D. Thesis, Communauté Université Grenoble-Alpes, Feb. 2018. [bib] [pdf] [slides] |
| [1] | M. Puys. Sécurité des cartes à puce, simulation d'attaques par fautes et analyses statiques. Master's Thesis, Communauté Université Grenoble-Alpes, Confidential industry, Jul. 2014. [bib] |
| [6] | M. Da Silva, S. Mocanu, M. Puys, and P.-H. Thevenon. Safety-Security Convergence: Automation of IEC 62443-3-2. Computers & Security, Elsevier, vol. 156, pp. 104477, (Rank Sciamago Q1), 2025. [bib] [pdf] |
| [5] | P.-H. Thevenon, S. Riou, D.-M. Tran, M. Puys, N. F. Polychronou, M. El Majihi, and C. Sivelle. iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems. Journal of Internet Services and Information Security (JISIS), vol. 13, no. 1, pp. 4-32, (Rank Sciamago Q3), 2022. [bib] [pdf] |
| [4] | M. Puys, P.-H. Thevenon, S. M. Mocanu, M. Gallissot, and C. Sivelle. SCADA Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 13, no. 1, pp. 4-32, (Rank Sciamago Q2), 2022. [bib] [pdf] |
| [3] | N.-F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms. ACM Transactions on Design Automation of Electronic Systems, vol. 27, no. 1, pp. 1-35, (Rank Sciamago Q2), 2021. [bib] [pdf] |
| [2] | J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, and J.-L. Roch. Formally and practically verifying flow properties in industrial systems. Computers & Security, Elsevier, vol. 86, no. 1, pp. 453-470, (Rank Sciamago Q1), 2019. [bib] [pdf] |
| [1] | J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and M. Puys. Dual protocols for private multi-party matrix multiplication and trust computations. Computers & Security, Elsevier, vol. 71, no. 1, pp. 51-70, (Rank Sciamago Q1), 2017. [bib] [pdf] |
| [25] | Z. Lagache, P.-H. Thevenon, M. Puys, and O.-E.-K. Aktouf. Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies using MITRE ATT&CK and D3FEND. To appear in: 30th Nordic Conference on Secure IT Systems (NordSec 2025, Rank ERA C), Tartu, Estonia, 2025. [bib] [pdf] |
| [24] | L. Arnoud, Z. Lagache, P.-H. Thevenon, A. Champenois, V. Breux, M. Puys, E. Gaussier, and O.-E.-K. Aktouf. HENDRICS: A Hardware-in-the-Loop Testbed for Enhanced Intrusion Detection, Response and Recovery of Industrial Control Systems. 30th European Symposium on Research in Computer Security (ESORICS 2025) - Workshop on Assessment with New methodologies, Unified Benchmarks, and environments, of Intrusion detection and response Systems (ANUBIS 2025), Toulouse, France, 2025. [bib] [pdf] |
| [23] | F. Duręcu, M. Puys, G. Chalhoub, and P.-M. Grollemund. Evaluation of Machine Learning Intrusion Detection Systems Resiliency to Network Traffic Evolution. 33rd International Conference on Software, Telecommunications, and Computer Networks (SoftCOM 2025, Rank Core B), Split, Croatia, 2025. [bib] [pdf] |
| [22] | A. Ben Hassen, P. Lafourcade, D. Mahmoud, and M. Puys. Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability. 20th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2025, Rank Core A), Hanoi, Vietnam, 2025. [bib] [pdf] |
| [21] | S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Secure Voting Protocol Using Balance Scale. 17th International Symposium on Foundations and Practice of Security (FPS 2024), Montreal, Canada, 2024. [bib] [pdf] |
| [20] | S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles. 27th Information Security Conference (ISC 2024), Washington DC, United States, 2024. [bib] [pdf] |
| [19] | M. Da Silva, M. Puys, P.-H. Thevenon, and S. Mocanu. PLC Logic-Based Cybersecurity Risks Identification for ICS. 18th International Conference on Availability, Reliability and Security (ARES 2023) - Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2023), Benevento, Italy, 2023. [bib] [pdf] |
| [18] | M. Da Silva, M. Puys, P.-H. Thevenon, S. Mocanu, and N. Nkawa. Automated ICS template for STRIDE Microsoft Threat Modeling Tool. 18th International Conference on Availability, Reliability and Security (ARES 2023) - Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2023), Benevento, Italy, 2023. [bib] [pdf] |
| [17] | N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A Hybrid Solution for Constraint Devices to Detect Microarchitectural Attacks. 8th IEEE European Symposium on Security and Privacy (EuroS&P 2023) - Workshop on Security of Software/Hardware Interfaces (SILM 2023), Delft, Netherlands, 2023. [bib] [pdf] |
| [16] | C. Sivelle, L. Debbah, M. Puys, P. Lafourcade, and T. Franco-Rondisson. Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. 27th Nordic Conference on Secure IT Systems (NordSec 2022, Rank ERA C), Reykjavik, Iceland, 2022. [bib] [pdf] |
| [15] | N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities. 19th IEEE International New Circuits and Systems Conference (NEWCAS 2021, Rank Qualis B4), Toulon, France, 2021. [bib] [pdf] |
| [14] | N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities. 24th IEEE Euromicro Conference on Digital System Design (DSD 2021, Rank Qualis B1), Palermo, Italy, 2021. [bib] [pdf] |
| [13] | M. Puys, P.-H. Thevenon, and S. Mocanu. Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training. 16th International Conference on Availability, Reliability and Security (ARES 2021) - Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2021), Vienna, Austria, 2021. [bib] [pdf] |
| [12] | M. Puys, J.-P. Krimm, and R. Collado. Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks. 14th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2020, Rank Qualis B3), Valencia, Spain, 2020. [bib] [pdf] |
| [11] | J.-G. Dumas, P. Lafourcade, J. López Fenner, D. Lucas, J.-B. Orfila, C. Pernet, and M. Puys. Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. 14th International Workshop on Security, (IWSEC 2019, Rank Core B), Tokyo, Japan, 2019. [bib] [pdf] |
| [10] | B. Badrignans, V. Danjean, J.-G. Dumas, P. Elbaz-Vincent, S. Machenaud, J.-B. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M.-L. Potet, M. Puys, J.-L. Richier, and R. Jean-Louis. Security Architecture for Embedded Point-to-Points Splitting Protocols. IEEE World Congress on Industrial Control Systems Security (WCICSS 2017), Churchil College, University of Cambridge, UK, 2017. [bib] [pdf] |
| [9] | M. Puys, M.-L. Potet, and A. Khaled. Generation of Applicative Attacks Scenarios Against Industrial Systems. 10th International Symposium on Foundations and Practice of Security (FPS 2017), Nancy, France, 2017. [bib] [pdf] |
| [8] | J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, and J.-L. Roch. Formally Verifying Flow Integrity Properties in Industrial Systems. 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT (Rank Core B), Madrid, Spain, Best Student Paper Award, 2017. [bib] [pdf] |
| [7] | M. Puys, J.-L. Roch, and M.-L. Potet. Domain Specific Stateful Filtering with Worst-Case Bandwidth. 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016, Rank Core C), Paris, France, 2016. [bib] [pdf] |
| [6] | M. Puys, M.-L. Potet, and P. Lafourcade. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. 35th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2016, Rank Core B), Trondheim, Norway, 2016. [bib] [pdf] |
| [5] | J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and M. Puys. Private Multi-party Matrix Multiplication and Trust Computations. 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT (Rank Core B), Best Paper Award, 2016. [bib] [pdf] |
| [4] | P. Lafourcade, and M. Puys. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France, 2015. [bib] [pdf] |
| [3] | L. Rivière, M.-L. Potet, T.-H. Le, J. Bringer, H. Chabanne, and M. Puys. Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montreal, QC, Canada, 2014. [bib] [pdf] |
| [2] | M. Puys, L. Rivière, J. Bringer, and T.-H. Le. High-Level Simulation for Multiple Fault Injection Evaluation. 19th European Symposium on Research in Computer Security (ESORICS 2014) - 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland, 2014. [bib] [pdf] |
| [1] | M.-L. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. 7th IEEE International Conference on Software Testing, Verification and Validation (ICST 2014, Rank Core A), Cleveland, Ohio, USA, 2014. [bib] [pdf] |
| [10] | Z. Lagache, P.-H. Thevenon, M. Puys, and O.-E.-K. Aktouf. Convergence sûreté-sécurité des Systèmes de Contrôle Industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2023), Neuvy-sur-Barangeon, France, 2023. [bib] [pdf] |
| [9] | M. Da Silva, P.-H. Thevenon, M. Puys, and S. Mocanu. Convergence sûreté-sécurité des Systèmes de Contrôle Industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2023), Neuvy-sur-Barangeon, France, 2023. [bib] [pdf] |
| [8] | M. Puys, and P.-H. Thevenon. PULSE - Cybersécurité des systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2022), Chambon-sur-Lac, France, 2022. [bib] [pdf] |
| [7] | M. Gallissot, M. Puys, and P.-H. Thevenon. Wonder-Cloud, une plateforme pour l’analyse et l'émulation de micrologiciels ainsi que la composition de pots de miels. C&esar 2020 - Deceptive Security, Rennes, France, 2020. [bib] [pdf] |
| [6] | S. Mocanu, M. Puys, and P.-H. Thevenon. An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems. C&esar 2019 - Virtualization and Cybersecurity, Rennes, France, 2019. [bib] [pdf] |
| [5] | M. Puys, and P.-H. Thevenon. Les défis posés par la sécurisation de l'IoT industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2019), Erquy, France, 2019. [bib] [pdf] |
| [4] | M. Puys, M.-L. Potet, and J.-L. Roch. Filtrage et vérification de flux métiers dans les systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), Toulouse, France, 2016. [bib] [pdf] |
| [3] | M. Puys, M.-L. Potet, and J.-L. Roch. Génération systèmatique de scénarios d'attaques contre des systémes industriels. Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL 2016), Besançon, France, 2016. [bib] [pdf] |
| [2] | M.-L. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL 2014), Paris, France, 2014. [bib] [pdf] |
| [1] | M.-L. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL 2014), Paris, France, 2014. [bib] [pdf] |
| [2] | M. Da Silva, P.-H. Thevenon, M. Puys, and S. Mocanu. Method and device for identifying risks of cyberattacks. US Patent App. 18/534,970, Jun 2024. [bib] |
| [1] | N. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. System for detecting malwares in a resources constrained device. US Patent App. 18/109,815, Aug 2023. [bib] |
| [2] | T. Senzier. La cybersécurité, un vrai sujet de recherche pour le laboratoire Limos, dans le Puy-de-Dôme. Journal La Montagne, édition du 26 septembre, 2024. [bib] [pdf] |
| [1] | M. Moran, P. Lafourcade, M. Puys, and D. Williams. An Introduction to Tools for Formal Analysis of Cryptographic Protocols. Handbook of Formal Analysis and Verification in Cryptography, 2023. [bib] [pdf] |
My research focuses on the cybersecurity of industrial and critical Internet of Things (IoT) (ICS, medical devices, connected vehicles, smart cities). The goal is to analyze how cyberattacks compromise the safety of these systems, meaning their reliable and safe operation.
With the rise of Industry 4.0, IoT is expanding into critical domains, increasing cyberattacks (e.g., Stuxnet, Mirai). These systems, unlike classical IT systems, prioritize process availability and safety. The major challenge is the joint study of safety and and security, often interconnected and potentially antagonistic, especially since current tools rarely manage them together due to combinatorial complexity.
My research areas are:
| Jury: | Guy Gogniat, Prof. Université Bretagne Sud, Reviewer |
| Lilian Bossuet, Prof. Université Jean Monnet, Reviewer | |
| Laure Gonnord, Prof. Grenoble INP, Examiner | |
| Gilles Sassatelli, DR CNRS/Université of Montpellier, President | |
| Vincent Beroulle, Prof. Grenoble INP, Supervisor | |
| Pierre-Henri Thevenon, CEA-LETI, Advisor | |
| Maxime Puys, CEA-LETI, Advisor |
| Jury: | Vincent Nicomette, Prof. INSA de Toulouse, Reviewer |
| Nga Nguyen, Associate Prof. ESILV, Reviewer | |
| Pascal Lafourcade, Prof. University Clermont Auvergne, Examiner | |
| Marie-Laure Potet, Prof. University Grenoble Alpes, President | |
| Stéphane Mocanu, Associate Prof. Grenoble INP, Supervisor | |
| Pierre-Henri Thevenon, CEA-LETI, Advisor | |
| Maxime Puys, Associate Prof. University Clermont Auvergne, Advisor |
I mainly teach at IUT Clermont Auvergne and ISIMA, mostly in French.
All my teaching material is available here, licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Permission is explicitly granted to copy, distribute and/or modify these document for educational purposes under the terms of the CC BY-NC-SA license.