Selected Publications

We develop a closed form expression to compute the intensity of adversarial perturbations to achieve an chosen expected success attack rate for logistic regression in a limited knowledge threat model.
Preprint

Recent Publications

  • Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression

    Details PDF Code

Recent Posts

Development

FLOSS Contributions

Significant Contributions

  • Implementation of state-of-the-art predictors for Spatial Regression Models in the spdep R package

Minor Contributions

White-Hat

Contributions to FLOSS Security

Vulnerabilities discovered:

CVE Software Type Description/Impact Links
CVE-2017-6877 Lutim Stored XSS Exposed all images uploaded by the user and their encryption keys issue
CVE-2017-10975 Lutim Stored XSS Idem. Hard to exploit in pratice issue
CVE-2017-1000051 CryptPad Stored XSS Exposed encryption keys of user data blog post
TeleR RCE 3 Arbitrary Code Executions on their server blog post soon
not disclosed Stored XSS 3 XSS exposing sensitive data
NCrypt Stored XSS issue
not disclosed Stored XSS
not disclosed Stored XSS
Shaarli Stored XSS Markdown plugin MR
not disclosed Stored XSS
Framaforms Improper Access Control Exposed URL of all users forms No public record
Framaforms Stored XSS Exposed responses of user forms. Too permissive formats allowed to untrusted users issue
Framaforms Stored XSS issue
Framaslides Stored XSS Markdown not sanitized commit
Framaslides Stored XSS Escape markdown link sanitization (marked lib not updated) issue
Framaslides Stored XSS issue
CVE-2017-11594 Loomio Stored XSS Markdown not sanitized. Allowing to cast users’ votes using their identity commit, blog post soon
not disclosed Stored XSS
Framemo & Sandstorm’s Scrumblr Stored XSS Markdown not sanitized issue, PR
Framemo & Sandstorm’s Scrumblr Formula Injection issue, MR
CVE-2017-1000039 Framadate Formula Injection issue, MR
not disclosed Stored XSS
CVE-2017-11593 Markdown Preview Plus Chrome’s Extension Stored XSS Led its users vulnerable to XSS in a ton of websites, by converting text, markdown and rst files to HTML without sanitization issue
not disclosed Stored XSS
Wallabag 2 & Graby Stored XSS PR
Kresus Stored Self-XSS Possible to leverage it by importing a malicious JSON issue
Dolomon Stored (Self)-XSS Multiple XSS. Some can be leveraged using a CSRF issue issue
Dolomon Improper Access Control Gave access to the URLs saved by all users issue
Dolomon Formula Injection issue
not disclosed Stored XSS
share-on-diaspora Wordpress Plugin Reflected Client XSS Fixed, but not discovered. PR

Contact

Fell free to contact me