-
Notifications
You must be signed in to change notification settings - Fork 1
/
index.html
139 lines (120 loc) · 18.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>aurelien.wail.ly</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Homepage of Aurélien Wailly">
<meta name="author" content="Aurélien Wailly">
<!-- Le styles -->
<link href='https://fonts.googleapis.com/css?family=Open+Sans' rel='stylesheet' type='text/css'>
<link href="assets/css/bootstrap.css" rel="stylesheet">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
</style>
<link href="assets/css/bootstrap-responsive.css" rel="stylesheet">
<!-- Le HTML5 shim, for IE6-8 support of HTML5 elements -->
<!--[if lt IE 9]>
<script src="http://html5shim.googlecode.com/svn/trunk/html5.js"></script>
<![endif]-->
<!-- Le fav and touch icons -->
<link rel="shortcut icon" href="favicon.ico">
<link rel="apple-touch-icon-precomposed" sizes="144x144" href="assets/ico/apple-touch-icon-144-precomposed.png">
<link rel="apple-touch-icon-precomposed" sizes="114x114" href="assets/ico/apple-touch-icon-114-precomposed.png">
<link rel="apple-touch-icon-precomposed" sizes="72x72" href="assets/ico/apple-touch-icon-72-precomposed.png">
<link rel="apple-touch-icon-precomposed" href="assets/ico/apple-touch-icon-57-precomposed.png">
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container">
<a class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</a>
<a class="brand" href="#">Security Engineer</a>
<div class="nav-collapse">
<ul class="nav">
<li class="active"><a href="index.html">Home</a></li>
<li><a href="#publications">Publications</a></li>
<li><a href="cours/index.html">Lectures</a></li>
<li class="dropdown" id="menu1">
<a class="dropdown-toggle" data-toggle="dropdown" href="#menu1">
Projects
<b class="caret"></b>
</a>
<ul class="dropdown-menu">
<li><a href="http://vespa.wail.ly">Vespa</a></li>
<li><a href="http://kfv.wail.ly">KungFuVisor</a></li>
<li><a href="https://github.com/awailly">RetroVisor</a></li>
<li><a href="https://github.com/awailly">Undolence</a></li>
<li><a href="https://github.com/awailly">Packer</a></li>
<li class="divider"></li>
</ul>
</li>
</ul>
</div><!--/.nav-collapse -->
</div>
</div>
</div>
<div class="container">
<!-- Main hero unit for a primary marketing message or call to action -->
<div class="hero-unit">
<h1>Aurélien Wailly</a></h1>
<p>I am an engineer in Cloud computing security at Amazon, and previously Orange Labs. My primary research interest is the application of autonomic concepts to adapt security to cloud environments. I also study underlying virtualization security to evaluate the impact of security incidents, lower attack surface and provide remediation.</p>
</div>
<!-- Example row of columns -->
<div class="row">
<div class="span4">
<h2>Lectures</h2>
<p>I am a part-time lecturer in some French schools: Telecom SudParis and Telecom ParisTech.<br /><br />Slides are available below.</p>
<p><a class="btn" href="cours/index.html">View details »</a></p>
</div>
<div class="span4">
<h2>Resume</h2>
<p>PhD subject and online resume are available below.</p>
<p>I defended my PhD Thesis at <a href="http://www.telecom-sudparis.eu/p_fr_contacts_trombinoscope_32.html?dpt=RST" rel="tooltip" title="Team">Telecom SudParis</a> and the document is available in the publications list.</p>
<p><a href="https://www.linkedin.com/in/aurelienwailly"><img height="32" width="32" src="img/icons/32px/linkedin.png"/></a> <a href="/sujet_de_doctorat.pdf" class="btn btn-success" rel="popover" title="PhD Subject" data-content="End-to-end Security Architecture and Self-Protection Mechanisms for Cloud Computing Environments">PhD Subject</a></p>
</div>
<div class="span4">
<h2>Contact</h2>
<p>You can contact me at aurelien (@) wail (.) ly by using <a href="https://keybase.io/dad">keybase.io</a>. You can also <a href="https://twitter.com/awailly" rel="tooltip" title="@awailly">follow me on twitter</a>.</p>
<p></p>
<p><a href="https://twitter.com/awailly"><img height="32" width="32" src="img/icons/32px/twitter-2.png"/></a> <img height="32" width="32" src="img/icons/32px/email.png"/><p>
</div>
</div>
<section id="publications"><div class="page-header"><h1>Publications <small>papers</small></h1></div><div class="row"><div class="span3 columns"><h3>2017</h3><p><a href="http://xdom0-2017.supercloud-project.eu/">XDOM0 2017 (EuroSys workshop)</a></p></div><div class="span9 columns"><h3>Workshop on Security and Dependability of Multi-Domain Infrastructures</h3><p/><p>Technical Program Committee</p><div class="btn-group"><a href="/publications/xdom0-2017-(eurosys-workshop)-2017.pdf" class="btn btn-info">PDF</a><a href="/publications/xdom0-2017-(eurosys-workshop)-2017-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/xdom0-2017-(eurosys-workshop)-2017.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2015</h3><p><a href="http://www.ualberta.ca/~ioanis/sss15/">SSS</a></p></div><div class="span9 columns"><h3>Data Stabilization Enforcement via Active Monitoring the Cloud Infrastructure Consistency Case</h3><p/><p>Reuven Yagel, Shlomi Dolev, Alexander Binun, Leonid Yankulin, Marc Lacoste, Thierry Coupaye, Mohammed Kassi-Lahlou, Alex Palesandro and Aurélien Wailly</p><div class="btn-group"><a href="http://www.ualberta.ca/~ioanis/sss15/tbd.html" class="btn btn-info">PDF</a><a href="/publications/sss-2015-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/sss-2015.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2015</h3><p><a href="http://ressi2015.utt.fr/programme.htm#tuto2">RESSI 2015 (Invité)</a></p></div><div class="span9 columns"><h3>Évolution des paradigmes de la sécurité pour les réseaux et systèmes dans le Cloud</h3><p/><p>Aurélien Wailly</p><div class="btn-group"><a href="http://ressi2015.utt.fr/programme.htm#tuto2" class="btn btn-info">PDF</a><a href="/publications/ressi-2015-(invité)-2015-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/ressi-2015-(invité)-2015.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2015</h3><p><a href="http://securitydaylille1.github.io/">Securitydaylille1</a></p></div><div class="span9 columns"><h3>Towards ultimate deobfuscation</h3><p/><p>Aurélien Wailly</p><div class="btn-group"><a href="http://lille1tv.univ-lille1.fr/collections/video.aspx?id=0c3fecd2-33c4-4919-afc1-3cc6138f8f2c" class="btn btn-info">PDF</a><a href="publications/securitydaylille1-2015-slides.html" class="btn btn-info">Slides</a><a href="/publications/securitydaylille1-2015.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2014</h3><p><a href="http://www.techniques-ingenieur.fr">TSI</a></p></div><div class="span9 columns"><h3>Étude et avenir de la sécurité des solutions de virtualisation</h3><p/><p>Marc Lacoste and Aurélien Wailly</p><div class="btn-group"><a href="http://www.techniques-ingenieur.fr/base-documentaire/technologies-de-l-information-th9/securite-des-si-services-et-applications-42315210/etude-et-avenir-de-la-securite-des-solutions-de-virtualisation-h6035/" class="btn btn-info">PDF</a><a href="/publications/tsi-2014-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/tsi-2014.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2014</h3><p><a href="https://edite-de-paris.fr/public/person/see/3072318">Ph. D</a></p></div><div class="span9 columns"><h3>End-to-End Security Architecture and Self-Protection Mechanisms for Cloud Computing Environments</h3><p/><p>Aurélien Wailly</p><div class="btn-group"><a href="https://tel.archives-ouvertes.fr/tel-01186228" class="btn btn-info">PDF</a><a href="/publications/ph.-d-2014-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/ph.-d-2014.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2014</h3><p><a href="http://conferences.computer.org/scc/2014/">SERVICES</a></p></div><div class="span9 columns"><h3>Self-Stabilizing Virtual Machine Hypervisor Architecture for Resilient Cloud</h3><p/><p>Alexander Binun, Mark Bloch, Shlomi Dolev, Ramzi Martin Kahil, Boaz Menuhin, Reuven Yagel, Thierry Coupaye, Marc Lacoste, Aurélien Wailly</p><div class="btn-group"><a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6903266" class="btn btn-info">PDF</a><a href="/publications/services-2014-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/services-2014.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2013</h3><p><a href="http://ucc2013.inf.tu-dresden.de/">UCC</a></p></div><div class="span9 columns"><h3>Flying Over Mobile Clouds with Security Planes: Select your Class of SLA for End-to-End Security</h3><p/><p>Marc Lacoste, Aurélien Wailly, Aymeric Tabourin, Loïc Habermacher, Xavier Le Guillou and Jean-Philippe Wary</p><div class="btn-group"><a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6809339" class="btn btn-info">PDF</a><a href="/publications/ucc-2013-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/ucc-2013.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2013</h3><p><a href="https://www.hackinparis.com/">HIP</a></p></div><div class="span9 columns"><h3>Malware vs Virtualization : The endless cat and mouse play</h3><p/><p>Aurélien Wailly</p><div class="btn-group"><a href="https://www.youtube.com/watch?v=L-c22iQUG7k" class="btn btn-info">PDF</a><a href="publications/hip-2013-slides.html" class="btn btn-info">Slides</a><a href="/publications/hip-2013.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2013</h3><p><a href="http://sei.pku.edu.cn/conference/sose2013">SOSE</a></p></div><div class="span9 columns"><h3>Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor</h3><p/><p>Sylvie Laniepce, Marc Lacoste, Mohammed Kassi-Lahlou, Fabien Bignon, Kahina Lazri and Aurélien Wailly</p><div class="btn-group"><a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6525501" class="btn btn-info">PDF</a><a href="/publications/sose-2013-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/sose-2013.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2013</h3><p><a href="http://compas2013.inrialpes.fr/">ComPAS</a></p></div><div class="span9 columns"><h3>RetroVisor: Nested Virtualization for Multi IaaS VM Availability</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="/publications/compas-2013.pdf" class="btn btn-info">PDF</a><a href="/publications/compas-2013-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/compas-2013.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2012</h3><p><a href="http://www.cesar-conference.org/">C&ESAR</a></p></div><div class="span9 columns"><h3>Self-Defending Clouds: Myth and Realities</h3><p/><p>Marc Lacoste, Aurélien Wailly and Hervé Debar</p><div class="btn-group"><a href="/publications/c&esar-2012.pdf" class="btn btn-info">PDF</a><a href="/publications/c&esar-2012-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/c&esar-2012.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2012</h3><p><a href="http://icac2012.cs.fiu.edu">ICAC</a></p></div><div class="span9 columns"><h3>VESPA: Multi-Layered Self-Protection for Cloud Resources</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="http://dl.acm.org/citation.cfm?id=2371536.2371564" class="btn btn-info">PDF</a><a href="/publications/icac-2012-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/icac-2012.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2012</h3><p><a href="https://sarssi2012.greyc.fr">SARSSI</a></p></div><div class="span9 columns"><h3>CGA as alternative security credentials with IKEv2: implementation and analysis</h3><p/><p>Jean-Michel Combes, Aurélien Wailly and Maryline Laurent</p><div class="btn-group"><a href="/publications/sarssi-2012.pdf" class="btn btn-info">PDF</a><a href="/publications/sarssi-2012-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/sarssi-2012.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2012</h3><p><a href="http://nsg.networks.imdea.org/edw2012/index.html">EuroDW</a></p></div><div class="span9 columns"><h3>KungFuVisor: Enabling Self-Defense Hypervisor</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="/publications/eurodw-2012.pdf" class="btn btn-info">PDF</a><a href="/publications/eurodw-2012-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/eurodw-2012.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2011</h3><p><a href="http://sosp2011.gsd.inesc-id.pt">SOSP</a></p></div><div class="span9 columns"><h3>-</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="/publications/sosp-2011.pdf" class="btn btn-info disabled">PDF</a><a href="/publications/sosp-2011-slides.pdf" class="btn btn-info disabled">Slides</a><a href="/publications/sosp-2011.bib" class="btn btn-info disabled">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2011</h3><p><a href="https://sites.google.com/site/agoraplaceorg/conferences/icsna-2011">ICSNA</a></p></div><div class="span9 columns"><h3>Internet Key Exchange Version 2 With IPv6 Cryptographically Generated Addresses</h3><p/><p>Jean-Michel Combes, Aurélien Wailly and Maryline Laurent</p><div class="btn-group"><a href="/publications/icsna-2011.pdf" class="btn btn-info">PDF</a><a href="/publications/icsna-2011-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/icsna-2011.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2011</h3><p><a href="http://sarssi-conf.org">SARSSI</a></p></div><div class="span9 columns"><h3>Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources (Long paper)</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="/publications/sarssi-2011.pdf" class="btn btn-info">PDF</a><a href="/publications/sarssi-2011-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/sarssi-2011.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2011</h3><p><a href="http://www.zurich.ibm.com/~cca/csc2011/">CSC Zurich</a></p></div><div class="span9 columns"><h3>Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources (Short paper)</h3><p/><p>Aurélien Wailly, Marc Lacoste and Hervé Debar</p><div class="btn-group"><a href="/publications/csc-zurich-2011.pdf" class="btn btn-info">PDF</a><a href="/publications/csc-zurich-2011-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/csc-zurich-2011.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2010</h3><p><a href="http://www.ietf.org/proceedings/79/ipsecme.html">IETF 79 Proceedings - ipsecme</a></p></div><div class="span9 columns"><h3>IKEv2 with CGA</h3><p/><p>Jean-Michel Combes and Aurélien Wailly</p><div class="btn-group"><a href="/publications/ietf-79-proceedings---ipsecme-2010.pdf" class="btn btn-info">PDF</a><a href="/publications/ietf-79-proceedings---ipsecme-2010-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/ietf-79-proceedings---ipsecme-2010.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/><div class="row"><div class="span3 columns"><h3>2010</h3><p><a href="">Stage</a></p></div><div class="span9 columns"><h3>Utilisation d'un nouveau type de matériel de sécurité avec IPsec/IKEv2</h3><p/><p>Aurélien Wailly</p><div class="btn-group"><a href="https://static-aurelien-wail-ly.s3-eu-west-1.amazonaws.com/stage-2010.pdf" class="btn btn-info">PDF</a><a href="/publications/stage-2010-slides.pdf" class="btn btn-info">Slides</a><a href="/publications/stage-2010.bib" class="btn btn-info">Bibtex</a></div></div></div><hr/></section>
<hr>
<footer>
<p>© Aurélien Wailly 2017</p>
</footer>
</div> <!-- /container -->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js"></script>
<script src="assets/js/bootstrap.min.js"></script>
<script>
!function ($) {
$(function(){
$("a[rel=tooltip]").tooltip()
$("a[rel=popover]").popover()
})
}(window.jQuery)
</script>
<script type="text/javascript">
var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-27249464-1']);
_gaq.push(['_trackPageview']);
(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);
})();
</script>
</body>
</html>