diff --git a/scolarship_CPI/letter.typ b/scolarship_CPI/letter.typ new file mode 100644 index 0000000..37306bf --- /dev/null +++ b/scolarship_CPI/letter.typ @@ -0,0 +1,46 @@ +#import "@preview/acrostiche:0.3.0": * + +#init-acronyms(( + "IDS": ("Intrusion Detection System"), + "BPV": ("Boot Process Verification"), +)) + + +#set page("us-letter") + + +I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships. +I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 in his doctoral studies. + +The first project he took part in explored the potential of side-channel analysis for defensive applications on embedded systems. +This work led to the publication of a paper in ... +The results from this first project highlighted several axis for future work on bootup verification, runtime analysis and log verification. +Arthur dedicated his Ph.D. to this topic and eventually explored all these branches of phycis-based defense. + +After the exploration phase, Arthur worked on bootup verification. +He proposed an approach for the problem of assessing the integrity of a machine using only a few known-good examples of bootup traces. +This approach led to two publications: first a work-in-progress paper in ... and then an aticle presented in ... that present the approach in more details and use-cases. +For each of these articles, Arthur was the main author and had to write all the publications, integrate reviewers comments, and travel to the conferences to present his work. + These were his first experiences with the presentation of researhc work. + +The second axis of research that Arthur explored was the runtime verification ofembedded systems. +With the goal to bridge the gap between raw side-channel information and rule-based intrusion detection systems, Arthur developped a few-shot pattern-recognition algorithm for univariate time series. +His work was published at ... and received the best paper awart for this edition. + +Arthur's current project aims at verifying the logs emmited by a machine using the power consumption, providing more trust to the log for later evaluation. + +Along his studies, Arthur also undertook the role of advisor for younger students. +He shares his experience of conducting experiments and writing articles with a few students each term. +This role led to multiple collaborations on topics like the study of power consumption patterns from battery-powered devices or pattern mining algorithms. +Other collaborations natturally spawend with other students, for example on the topic of system's trust management. + +Arthur also took the opportunity of his Ph.D. studies to learn new topics for personnal research projects. +He proposed to learn PCB design to build a new power trace capture system for USB-C charging cables. +He also reached out to other labs to explore his idea of using power cables as bi-directional covert channels. + +Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group. +His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable conferences. + +Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community. + +I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship. diff --git a/scolarship_CPI/research.typ b/scolarship_CPI/research.typ index 9e0f595..c5d17bb 100644 --- a/scolarship_CPI/research.typ +++ b/scolarship_CPI/research.typ @@ -36,20 +36,3 @@ The boot sequence of a machine is a critical state for the machine security. The bootloader and firmware that executes during this sequence controles the lowest level of software that sets important security parameter. Moreover, this is a particularily vulnerable sequence as no host-based #acr("IDS") is running. There are hardware-based mechanisms, often leveraging cryptographic sugnatures, that strive to prevent firmware tampering, but studies illustrated the possibility to bypass them #cn. - -#pagebreak() - -I am recommending Arthur Grisel-Davy for the Cybersecurity and Privacy Excellence Graduate Scholarships. -I have supervised Arthur first in 2019 when he was a visiting student discovering the world of research, and then again since 2021 in his doctoral studies. - -I have seen Arthur learn the ... of academic research by always learning how to overcom challenges and striving to become a better scientist. -Arthur has consistently demonstrated dedication, creativity, and scholarly achievement throughout his studies in our research group. -His commitment to advancing the field of cybersecurity and privacy is evident in his motivation, ideas, accomplishments, and publications in reputable journals. - -Along his studies, Arthur also undertook the role of advisor for younger students. -He shares his experience of conducting experiments and writing articles with a few students each term. - -Arthur is a person of integrity, professionalism, and a collaborative spirit, making him a valuable member of our academic community. -His willingness to mentor other students further demonstrates his commitment to academic excellence and community engagement. - -I believe that Arthur Grisel-Davy would be a deserving recipient of this scolarship.