Graduate School and Research Center in Digital Sciences


Eurecom - Digital Security 
04 93 00 81 56
04 93 00 82 00


  • He is currently Professor within the Department Digital Security where he teaches software development.

My courses

  • Forensics / Spring 2018 - Cyber-crime and Computer Forensics


    The course is roughly divided in two separate parts. The first covers the   topics of computer forensics and incident response. In particular, we   discuss a number of techniques and open source tools to acquire and   analyze network traces, hard disk images, Windows and Linux operating   system artifacts, log files, and memory images.

    The second part of the course deals with the analysis of malware and   unknown binaries. Here the goal is to introduce students to the main  classes of techniques used in malware analysis and reverse engineering.   We cover both static techniques (ELF and PE file structures,   dissasseblers and decompilers, data and control flow analysis, abstract   interpretation, ...) and dynamic techniques (sandboxing, library and   syscall traces, dynamic instrumentation, debugging, taint analysis,   unpacking,...). We will use mostly open source tools, with the exception of IDA Pro.

    Teaching and Learning Methods :  Lectures and Homework Assignment

  • SoftDev / Fall 2018 - Software development methodologies

     This course covers a variety of topics, all related to the use and   management of a Linux operating system. In particular, the course   is divided in three parts dedicated respectively to the command-line,  to the Python programming language, and to maintaining, compiling, and  installing applications.

    Teaching and Learning Methods
    Lectures and Homework Assignments



  • In April 2017, he reveived with his co-authors (Onur Catakoglu and Marco Balduzzi) the Best Paper Award for their article "Attacks landscape in the dark side of the web" (SAC 2017).

  • In 2016, he received with his co-authors the "ACM Europe Student Best Paper Award" for the article "PhishEye: Live Monitoring of Sandboxed Phishing Kits" (CCS 2016)

  • In 2013, he received with his co-authors the Best Student Paper Award for the article: "Implementation and implications of a stealth hard-drive backdoor" (ACSAC 2013).

  • In 2011, he had been awarded the Distinguished Paper Award for the article "Automated discovery of parameter pollution vulnerabilities in web-applications".