{"id":10,"date":"2015-06-15T10:23:49","date_gmt":"2015-06-15T08:23:49","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=10"},"modified":"2026-03-10T14:39:14","modified_gmt":"2026-03-10T12:39:14","slug":"cv","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/JDreier\/cv\/","title":{"rendered":"CV"},"content":{"rendered":"<div class=\"important_div\" style=\"text-align: center\"><\/div>\n<h4 class=\"cv\">Positions<\/h4>\n<ul>\n<li>09\/2020 &#8211; 08\/2021: D\u00e9l\u00e9gation\/Detachment to INRIA (LORIA)<\/li>\n<li>09\/2019 &#8211; 08\/2020: D\u00e9l\u00e9gation\/Detachment to CNRS (LORIA)<\/li>\n<li class=\"p1\">Since 09\/2015: Ma\u00eetre de Conf\u00e9rences <span class=\"s1\">(Universit\u00e9 de Lorraine \/ LORIA \/ TELECOM Nancy)<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">01\/2014 &#8211; 08\/2015: Postdoc, <a href=\"http:\/\/www.infsec.ethz.ch\/\">Institute of Information Security,<\/a> <a href=\"http:\/\/www.ethz.ch\/\">ETH Z\u00fcrich<\/a>, working with <a href=\"https:\/\/www.inf.ethz.ch\/personal\/basin\/\">David Basin<\/a><br \/>\n<\/span><\/li>\n<li class=\"p1\">12\/2010 &#8211; 12\/2013: PhD student, <a href=\"http:\/\/www-verimag.imag.fr\/\">VERIMAG<\/a>, Grenoble, under supervision of <a href=\"http:\/\/www-verimag.imag.fr\/%7Elakhnech\/\">Yassine Lakhnech<\/a> and <a href=\"http:\/\/www-verimag.imag.fr\/%7Eplafourc\/\">Pascal Lafourcade<\/a><\/li>\n<li class=\"p1\">04\/2010 &#8211; 09\/2010: Master&rsquo;s intern at SAP Research Karlsruhe, working with <a href=\"http:\/\/www.fkerschbaum.org\/\">Florian Kerschbaum<\/a><\/li>\n<\/ul>\n<h4 class=\"cv\">Publications<\/h4>\n<p>See <a href=\"https:\/\/members.loria.fr\/JDreier\/publications\/\">here<\/a> or <a href=\"https:\/\/dblp.org\/pid\/52\/10310.html\">DBLP<\/a> or <a href=\"http:\/\/scholar.google.com\/citations?user=VPIOsIQAAAAJ&amp;hl=en\">Google Scholar<\/a>.<\/p>\n<h4 class=\"cv\">Projects<\/h4>\n<p>See <a href=\"https:\/\/members.loria.fr\/JDreier\/projets\/\">here<\/a>.<\/p>\n<h4 class=\"cv\">Program Commitees<\/h4>\n<ul>\n<li><a href=\"https:\/\/petsymposium.org\">PETS 2026 \/ PoPETs 2026<\/a><\/li>\n<li><a href=\"https:\/\/esorics2024.org\/\">29th European Symposium on Research in Computer Security (ESORICS&rsquo;24)<\/a><\/li>\n<li><a href=\"https:\/\/www.ares-conference.eu\/\">19th International Conference on Availability, Reliability and Security (ARES 2024)<\/a><\/li>\n<li><a href=\"https:\/\/www.codaspy.org\/2024\/\">ACM Conference on Data and Application Security and Privacy (CODASPY\u201924)<\/a><\/li>\n<li><a href=\"https:\/\/movep24.irisa.fr\/\">16th Summer School on Modelling and Verification of Parallel Processes (MOVEP\u201924)<\/a><\/li>\n<li><a href=\"https:\/\/www.dmi.unict.it\/giamp\/sac\/cfp2022.php\">Security Track at the ACM\/SIGAPP Symposium On Applied Computing (SEC@SAC) 2022<\/a><\/li>\n<li><a href=\"https:\/\/www.dmi.unict.it\/giamp\/sac\/cfp2022.php\">Security Track at the ACM\/SIGAPP Symposium On Applied Computing (SEC@SAC) 2022<\/a><\/li>\n<li><a href=\"https:\/\/indocrypt2021.lnmiit.ac.in\/\">Indocrypt 2021<\/a><\/li>\n<li><a href=\"https:\/\/www.ares-conference.eu\/workshops\/ens-2021\/\">International Workshop on Emerging Network Security (ENS 2021)<\/a><\/li>\n<li><a href=\"http:\/\/www.dmi.unict.it\/~giamp\/sac\/cfp2021.php\">Security Track at the ACM\/SIGAPP Symposium On Applied Computing (SEC@SAC) 2021<\/a><\/li>\n<li><a href=\"https:\/\/www.ares-conference.eu\/workshops\/5g-ns-2020\/\">Workshop on 5G Networks Security (5G-NS 2020)<\/a><\/li>\n<li><a href=\"http:\/\/nsclab.org\/acisp2020\/\">Australasian Conference on Information Security and Privacy (ACISP) 2020<\/a><\/li>\n<li><a href=\"http:\/\/www.dmi.unict.it\/~giamp\/sac\/cfp2020.php\">Security Track at the ACM\/SIGAPP Symposium On Applied Computing (SEC@SAC) 2020<\/a><\/li>\n<li><a href=\"https:\/\/www.ares-conference.eu\/workshops\/5g-ns-2019\/\">Workshop on 5G Networks Security (5G-NS 2019)<\/a><\/li>\n<li><a href=\"https:\/\/project.inria.fr\/grsrd2019\/\">Grande Region Security and Reliability Day 2019 (Chair)<\/a><\/li>\n<li><a href=\"https:\/\/cispa.saarland\/grsrd18\/\">Grande Region Security and Reliability Day 2018 (Co-Chair)<\/a><\/li>\n<li><a href=\"http:\/\/satoss.uni.lu\/sacps2015\/index.html\">First International Workshop on Security Aspects of Cyber-Physical Systems (SACPS&rsquo;15)<\/a><\/li>\n<\/ul>\n<h4 class=\"cv\">Software<\/h4>\n<p>I am co-developing the <a href=\"http:\/\/tamarin-prover.github.io\/\">Tamarin prover<\/a>.<\/p>\n<h4 class=\"cv\">Awards<\/h4>\n<ul>\n<li><a href=\"https:\/\/rwc.iacr.org\/LevchinPrize\/\">Levchin Prize<\/a> for real-world cryptography 2026 for \u00ab\u00a0The Tamarin prover, and its use in the analysis of real-world security protocols\u00a0\u00bb, together with David Basin, Cas Cremers and Ralf Sasse<\/li>\n<li>Best Paper Award at ESORICS\u201920 for the paper \u00ab\u00a0Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols\u00a0\u00bb, co-authored with V\u00e9ronique Cortier and St\u00e9phanie Delaune<\/li>\n<li>Best Student Paper Award at SECRYPT\u201917 for the paper \u00ab\u00a0Formally verifying flow integrity properties in industrial systems\u00a0\u00bb, co-authored with Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, and Jean-Louis Roch<\/li>\n<li>Best Paper Award at SECRYPT\u201914 for the paper \u00ab\u00a0Formal analysis of electronic exams\u00a0\u00bb, co-authored with Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini and Peter Y. A. Ryan<\/li>\n<li>Best Paper Award at PASSAT\u201911 for the paper \u00ab\u00a0Practical privacy-preserving multiparty linear programming based on problem transformation\u00a0\u00bb, co-authored with Florian Kerschbaum<\/li>\n<\/ul>\n<h4 class=\"cv\">Students<\/h4>\n<ul>\n<li>PhD:\n<ul>\n<li><a href=\"https:\/\/perso.isima.fr\/~dhmahmoud\/\">Dhekra Mahmoud<\/a> (2022-2025, co-supervised with Pascal Lafourcade, now Postdoc at CISPA in Cas Cremer&rsquo;s group)<\/li>\n<li>Elise Klein (2021-2025, co-supervised with Steve Kremer)<\/li>\n<li><a href=\"https:\/\/racoucho1u.github.io\/\">Maiwenn Racouchot<\/a> (2021-2024, co-supervised with Steve Kremer, now Associate Professor at LMF)<\/li>\n<\/ul>\n<\/li>\n<li>M2:\n<ul>\n<li>Tom Gouville (2023)<\/li>\n<li>Val\u00e9rian Hatey (2021)<\/li>\n<li>Corentin Hug (2020)<\/li>\n<\/ul>\n<\/li>\n<li>M1:\n<ul>\n<li>Zo\u00e9 Le Gleut (2025)<\/li>\n<li>Tom Bloch (2025)<\/li>\n<li>Mathias Aurand-Augier (2024)<\/li>\n<li>Hugo Thevenin (2024)<\/li>\n<li>Wenjia Tang (2023)<\/li>\n<li>Valentin Thiebaux (2023)<\/li>\n<li>Nicolas Beaudouin (2022)<\/li>\n<li>Yann Colomb (2021)<\/li>\n<li>Elise Klein (2020)<\/li>\n<li>Maiwenn Racouchot (2020)<\/li>\n<li>Corentin Hug (2019)<\/li>\n<\/ul>\n<\/li>\n<li>L3:\n<ul>\n<li>Phuoc Nguyen (2020)<\/li>\n<li>Devansh Chandak (2020)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 class=\"cv\">Education:<\/h4>\n<ul>\n<li>2013 PhD in Computer Science, Universit\u00e9 de Grenoble, France,<\/li>\n<li>2010 Master de Recherche (Master of Research), mention \u00abTr\u00e8s bien\u00bb (\u00ab\u00a0very good\u00a0\u00bb), \u00c9cole nationale sup\u00e9rieure d&rsquo;informatique et de math\u00e9matiques appliqu\u00e9es (ENSIMAG), Grenoble, France<\/li>\n<li>2010 Dipl\u00f4me d&rsquo;Ing\u00e9nieur (French engineering degree) in computer science, mention \u00abTr\u00e8s bien\u00bb (\u00ab\u00a0very good\u00a0\u00bb), rank 1, ENSIMAG, Grenoble, France<\/li>\n<li>2010 Diplom-Informatiker (Master&rsquo;s equivalent) \u00ab\u00a0mit Auszeichnung\u00a0\u00bb (with distinction), Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany<\/li>\n<\/ul>\n<h4 class=\"cv\">Theses<\/h4>\n<p>I defended my PhD thesis entitled \u00ab\u00a0Formal Verification of Voting and Auction Protocols: From Privacy to Fairness and Verifiability\u00a0\u00bb on Monday, November 25, 2013. <a href=\"http:\/\/www.theses.fr\/2013GRENM051\">Thesis Document<\/a> &#8211; <a href=\"https:\/\/members.loria.fr\/JDreier\/files\/downloads\/thesis-code.zip\">Code<\/a> &#8211; <a href=\"http:\/\/mi2s.imag.fr\/verification-formelle-des-protocoles-de-vote-et-de-vente-aux-encheres-de-lanonymat-a-lequite-et-la-v\">Video of my presentation<\/a><\/p>\n<p>My masters thesis was entitled \u00ab\u00a0Privacy-Preserving Linear Programming in the Cloud\u00a0\u00bb, and jointly submitted to \u00c9cole Nationale Sup\u00e9rieure d&rsquo;Informatique et de Math\u00e9matiques Appliqu\u00e9es de Grenoble (ENSIMAG) and Karlsruhe Institute of Technology (KIT) in 2010. The project was completed at SAP Research Karlsruhe under joint supervision by Florian Kerschbaum, Pascal Lafourcade, and J\u00f6rn M\u00fcller-Quade.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Positions<\/p>\n<ul>\n<li>09\/2020 &#8211; 08\/2021: D\u00e9l\u00e9gation\/Detachment to INRIA (LORIA)<\/li>\n<li>09\/2019 &#8211; 08\/2020: D\u00e9l\u00e9gation\/Detachment to CNRS (LORIA)<\/li>\n<li class=\"p1\">Since 09\/2015: Ma\u00eetre de Conf\u00e9rences (Universit\u00e9 de Lorraine \/ LORIA \/ TELECOM Nancy)<\/li>\n<li class=\"p1\">01\/2014 &#8211; 08\/2015: Postdoc, <a href=\"http:\/\/www.infsec.ethz.ch\/\">Institute of Information Security,<\/a> <a href=\"http:\/\/www.ethz.ch\/\">ETH Z\u00fcrich<\/a>, working with <a href=\"https:\/\/www.inf.ethz.ch\/personal\/basin\/\">David Basin<\/a>\n<\/li>\n<li class=\"p1\">12\/2010 &#8211; 12\/2013: PhD student, <a href=\"http:\/\/www-verimag.imag.fr\/\">VERIMAG<\/a>, Grenoble, under supervision of <a href=\"http:\/\/www-verimag.imag.fr\/%7Elakhnech\/\">Yassine Lakhnech<\/a> and <a href=\"http:\/\/www-verimag.imag.fr\/%7Eplafourc\/\">Pascal Lafourcade<\/a><\/li>\n<li class=\"p1\">04\/2010 &#8211; 09\/2010: Master&rsquo;s intern at SAP Research Karlsruhe, working with <a href=\"http:\/\/www.fkerschbaum.org\/\">Florian Kerschbaum<\/a><\/li>\n<\/ul>\n<p>Publications<\/p>\n<p>See <a href=\"https:\/\/members.loria.fr\/JDreier\/publications\/\">here<\/a> or <a href=\"https:\/\/dblp.org\/pid\/52\/10310.html\">DBLP<\/a> or <a href=\"http:\/\/scholar.google.com\/citations?user=VPIOsIQAAAAJ&amp;hl=en\">Google Scholar<\/a>.<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":85,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":418,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/10\/revisions\/418"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}