Training of Highly Qualified Personnel

Training of highly qualified personnel is one of the most important missions of a University Professor.  In the past years, I supervised and brought to successful completion:

  • 22 Ph.D. students
  • 64 Master students
  • 10 Postdoctoral fellows

Thirteen (15) former Ph.D. students are now established Professors: 6 in Canadian Universities, 1 in US and 8 in Golf and Middle-East Universities. Former Master's students are now working in leading corporations such as: Mandiant, Research In Motion (RIM), Microsoft, Oracle, Deloitte, Price Waterhouse Coopers, Tata Research Labs, Cisco, Morgan Stanley, etc.

Many of my students won prestigious awards:

  • One former Ph.D. student, Noman Mohammed has been ranked first nationwide in the Natural Sciences and Engineering Research Council of Canada (NSERC) Postdoctoral Fellowship Competition, May 2013.
  • Two of my graduate students are recipients of the prestigious Canadian Governor Academic Medal:
    • Painchaud, Frédéric (Gold Medal)
    • Doyon, Stéphane (Silver Medal)
  • One graduate student, Myriam Fourati, won the prestigious Presidential Prize of Tunisia.
  • Eight graduate students won the Provincial IT Excellence Award, OCTAS.

Below is a summary as well as several lists of Postdoctoral fellows, Ph.D. and Master's students supervised or co-supervised and their current affiliations.

Former Postdoctoral Fellows under my Supervision

  1. Djedjiga Mouheb. Malware Analysis and Software Fingerprinting. 2013. Postdoctoral Fellow, Concordia University.

  2. Stere Preda. Malware Analysis and Software Fingerprinting. 2013. Postdoctoral Fellow, Concordia University.

  3. Hanane Houmani. Cryptographic Protocol Analysis and Correctness. 2012. N.A..

  4. Dima Alhadidi. Security and Privacy of User-Generated data for Personalized Cloud Computing Services. 2012. Research Associate, Concordia University.

  5. Yosr Jarraya. Model-Based Engineering of Secure Software and Systems. 2012. Research Associate, Concordia University.

  6. Farkhund Iqbal. Email Forensics: Authorship and Concept Analysis. 2012. Assistant Professor, Zayed Univ., UAE.

  7. Nadia Belblidia. Aspect Oriented Approach for Security Hardening. 2010. Lecturer at Cegep De Maisonneuve, Montreal.

  8. Chamseddine Talhi. Model-Based Engineering of Secure Software and Systems. 2009. Assistant Professor at ETS, Montreal.

  9. Rachid Hadjidj. Security of Free and Open Source Software. 2008. Assistant Professor at Qatar University.

  10. Hamdi Yahyaoui. Security of Free and Open Source Software. 2007. Assistant Professor, Kuwait University.

Completed Ph.D. Theses under my Supervision

  1. Samir Ouchani. A Security Verification Framework for SysML Activity Diagrams. 2013. Postdoctoral Fellow, Luxembourg University.

  2. Serguei Mokhov. Intensional Cyber forensics. 2013. Network Security Specialist, Concordia University.

  3. Djedjiga Mouheb. Model-Driven Aspect-Oriented Software Security Hardening. 2013. Postdoctoral Fellow, Concordia University.

  4. Noman Mohammad. Models and Algorithms for Private Data Sharing. 2012. Postdoctoral Fellow, McGill University.

  5. Aiman Hanna. A Hybrid Framework for the Systematic Detection of Software Security Vulnerabilities in Source Code. 2012. LTA Faculty Member, Concordia University.

  6. Emna Menif. Inférence de certificats pour la vérification statique des programmes Java. 2012. Assistant Professor, ESTI Tunisia.

  7. Farkhund Iqbal. Messaging Forensic Framework for Cybercrime Investigation. 2011. Assistant Professor, Zayed University, UAE.

  8. Dima Alhadidi. Theoretical and Practical Framework for Aspect-oriented Security Hardening. 2010. Assistant Professor, Zayed University, UAE.

  9. Yosr Jarraya. Verification and Validation of UML and SysML Based Systems Engineering Design Models. 2010. Research Associate, Concordia University.

  10. Nadia Belblidia. An Aspect Oriented Approach for Security Hardening: Semantic Foundations. 2008. Lecturer, Cegep De Maisonneuve.

  11. Azzam Mourad. An Aspect-Oriented Framework for Systematic Security Hardening of Software. 2008. Assistant Professor, Lebanese American University, Lebanon.

  12. Hadi Otrok. Mechanism Design and Game Theoretical Models for Intrusion Detection. 2008. Assistant Professor, KUSTAR University, United Arab Emirates.

  13. Mohamed Saleh. Game Semantics for the Specification and Analysis of Security Protocols. 2008. Assistant Professor, Alexandria University, Egypt.

  14. Syrine Tlili. Automatic Detection of Safety and Security Vulnerabilities in Open Source Software. 2008. Assistant Professor, ESTI Tunisia.

  15. Chamseddine Talhi. Memory-Constrained Security Enforcement. 2007. Assistant Professor, ETS (Univ. of Quebec), Montreal.

  16. Lamia Ketari. Acceleration of Embedded Java Platforms: Techniques and Formal Framework. 2007. Assistant Professor, King Saud University, Saudi Arabia.

  17. Hamdi Yahyaoui. Acceleration and Semantic Foundations of Embedded Java Platforms. 2006. Assistant Professor, Kuwait University.

  18. Béchir Ktari. Certification de composantes logicielles. 2003. Associate Professor, Laval University, Quebec.

  19. Kamel Adi. Formal specification and analysis of security protocols. 2002. Full Professor, Université du Quebec en Outaouais.

  20. Mohamed Mejri. From type theory to the verification of security protocols. 2001. Full Professor, Laval University.

Completed Master's Theses under my Supervision

  1. Honghui Ding. Authorship Identification and Writeprint Visualization. 2014. N.A..

  2. Ashkan Rahimian. Assembly to Open Source Code Matching for Reverse Engineering and Malware Analysis. 2013. Research Associate, Concordia University.

  3. Sahba Sadri. Towards Migrating Security Policies along with Virtual Machines in Cloud. 2014. N.A..

  4. Noureddine Lakhdari. Fingerprinting Malicious IP Traffic. 2014. Research Associate, Concordia University.

  5. Samira Barouti. Privacy-Preserving Query Processing on Outsourced Databases in Cloud Computing. 2013. Software Developer, Ericsson Canada.

  6. Dinh Tran Thai Son. Mining Cyber Security Intelligence from Spam Data. 2013. N.A..

  7. Mohammad Reza Farhadi. Assembly Code Clone Detection for Malware Binaries. 2013. Ph.D. Student, Concordia University.

  8. Mohamed Taher Adel. Differentially Private Traffic Padding for Web Applications. 2014. N.A..

  9. Swagata Das. Instant Messaging Spam Detection in Long Term Evolution Networks. 2013. N.A..

  10. Srivas Venkatesh. Aspect Oriented Modeling For Representing and Integrating Security Aspects in UML Models. 2013. Software Engineer, Capital Group.

  11. Raha Ziarati. Dynamic Matching and Weaving Semantics for Executable UML Models. 2013. Threat Researcher, Sophos.

  12. Thomas Ormerod. . 2012. Manager, Electronic Commerce Enforcement, CRTC Commission.

  13. Elias Bou Harb. A Distributed Architecture for Spam Mitigation on 4G Mobile Networks. 2011. Ph.D. Student, Concordia University.

  14. Ann Fry. A Forensic Web Log Analysis Tool: Techniques and Implementation. 2011. Ph.D. Student, Carleton University, Ottawa, Canada.

  15. Hai Zhou Ling. Towards the Automation of Vulnerability Detection in Source Code. 2010. N.A..

  16. Omar Nbou. Detecting and Modeling Polymorphic Shellcode. 2011. CEO, Akson Consulting Inc..

  17. Prosenjit Sinha. Botnet Reverse Engineering and Call Sequence Recovery. 2011. Software Developer at R.

  18. Hakim Idrissi Kaitouni. Framework for Systematic Security Hardening. 2010. Key Account Manager, Omnidata.

  19. Mariam Nouh. Aspect-Oriented Weaving and Model-to-Model Transformation for Security Hardening. 2010. Ph.D. Student, McGill University.

  20. Vitor Nunes De Lima. Framework for Automatic Verification of UML Design Models: Application to ULM 2.0 Interactions. 2010. Researcher and Software Developer, Private IT Company.

  21. XiaoChun Yang. Automatic Detection of Security Vulnerabilities in Source Code. 2010. Security Automation Analyst, BlackBerry.

  22. Amine Boukhtouta. AspectJ Extensions for Security Hardening. 2009. Ph.D. Student, Concordia University.

  23. Seyed Mahmood Hejazi. Analysis of Windows Memory for Forensic Investigations. 2009. Senior Cybersecurity Consultant, Deloitte.

  24. Anil Kumar Venkataiahgari. E-Commerce Protocols for Secure Multicast Sessions. 2006. Network Engineer, Cisco.

  25. Ali Reza Arasteh. Forensic Analysis of Windows Physical Memory. 2008. Manager, Deloitte.

  26. Noman Mohamad. Mechanism Design-Based Leader Election Scheme for Intrusion Detection in Manet. 2008. Postdoctoral Fellow, McGill University.

  27. Assaad Sakha. Cyber Forensic Log Analysis. 2008. Manager, Cyber Resilience, Price Waterhouse Coopers Canada.

  28. Zhenrong Yang. On Building A Dynamic Security Vulnerability Detection System using Program Monitoring Technique. 2008. Software Development Engineer II, Microsoft.

  29. Luay Alawneh. Verification and Validation in Systems Engineering: Application to UML 2.0. 2007. Assistant Professor, Jordan University of Science and Technology.

  30. Marc-André Laverdière. Towards Systematic Security Hardening. 2007. Software Security Researcher, TCS Innovation Labs.

  31. Andrei Soeanu. Automatic Verification of Behavioral Specifications in Software Intensive Systems. 2007. Ph.D. Student, Concordia University.

  32. Djemel Benredjem. Contributions to Cyber Forensics: Processes and E-Mail Analysis. 2007. N.A..

  33. Hassan Issa. Enterprise Application Integration with Qualitative QOS Considerations. 2006. Program Manager II, Microsoft.

  34. Mona Mehrandish. Intrustion Detection: A Game Theoretic Approach. 2006. Software Developer, Amazon.

  35. Sujoy Ray. A Message-Based Middleware for Enterprise Application Integration. 2006. Ph.D. Student, Concordia University.

  36. Payam Panjesh Shahi. Verification and Validation Techniques in Systems Engineering. 2006. Senior Business Analyst, HSBC.

  37. Ali Benssam. Digital Cockpits and Decision Support Systems. 2006. N.A..

  38. Zahia Aidoud. Inference de types et d'effets récursifs en présence de sous-typage. 1997. N.A..

  39. El Hachemi Alikacem. Optimisation des langages orientés objets: application a l'optimisation des invocations dynamiques en Java. 1999. Advisor, CRIM Canada.

  40. Abdesselam Benzakour. Vérification formelle des systèmes parallèles. 1998. Software Developer, Statistics Canada.

  41. Fouzia Bouguerch. Vérification formelle des systèmes de travail coopératif: une approche basée sur les algèbres de processus. 1997. N.A..

  42. Véronique Briard. Verification des protocoles de commerce électronique. 2003. N.A..

  43. Stéphane Doyon. On the security of JAVA: the Java bytecode verifier. 1999. Software developer, Google.

  44. Mourad Mohammed Erhioui. Détection statique de codes malicieux dans les logiciels commerciaux. 2001. Oracle E-business Architect, Fujitsu Canada.

  45. Ali Faour. Un système de types annotés pour l'analyse de flot de contrôle dans les langages multi-paradigmes. 1997. Software Developer, Statistics Canada.

  46. Myriam Fourati. Vers une sémantique statique formelle pour Java. 2000. Professor at ESTI, Tunisia.

  47. Emmanuel Giasson. Code auto-certifié par typage: détection de code malicieux dans les programmes ANSI C. 2002. Senior Consultant, Nurun.

  48. Marc Girard. Sécurité sous Windows NT 4: monitorage d'exécution en vue de détecter du code malicieux. 2001. Strategic Consultant in Information Security, CSST.

  49. Béchir Ktari. Programmation orientée objet. 1998. Associate Professor, Laval University.

  50. Yvan Lavoie. Détection des comportements malicieux dans les logiciels commerciaux. 2003. Computer Scientist, Defence Research and Development Canada.

  51. Yolaine Legaré. Analyse formelle de protocoles cryptographiques: développement d'un nouvel environnement et étude de cas. 1999. Financial Advisor, Shared Services Canada.

  52. Frédéric Massicotte. Une théorie des types pour les classes de failles dans les crypto-protocoles. 2000. Technical Analyst, Government of Canada.

  53. Mohamed Mejri. Formal automatic verification of authentication cryptographic protocols. 1998. Full Professor, Laval University.

  54. Emna Menif. Application des techniques de focalisation pour la compréhension de programmes. 1998. N.A..

  55. Frédéric Michaud. Securité logicielle et détection de code malicieux par “model-checking”. 2003. Senior Cyber Specialist, Thales Canada.

  56. Mouestsie Molière. Vers un nouveau paradigme de programmation parallèle en Java. 1999. Product Owner and Technical Product Manager, Ericsson Canada.

  57. Azzam Mourad. A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. 2005. Assistant Professor, Lebanese American University, Lebanon.

  58. Frédéric Painchaud. Towards more efficient, flexible and robust Java security. 2002. Scientist, Defence Research and Development Canada.

  59. Luc Poulin. Méthodologie et politiques de sécurité. 2002. Security Senior Advisor at Cogentas, Canada.

  60. Jean-Fran\ccois Rodrigue. Conception et implantation d'un compilateur Java optimisant. 2000. N.A..

  61. Marta Stojanovic. Automatic memory management in Java. 2001. Application Developer Specialist, National Research Council.

  62. Imed Yahmadi. Vers un calcul pour la specification et l'analyse des protocoles cryptographiques. 1998. Vice President Engineering, Ophio Software.

  63. Hamdi Yahyaoui. Sémantique dynamique et analyse de flot de contrôle pour Java. 2000. Assistant Professor, Kuwait University.

  64. Sami Zhioua. A dynamic compiler for an embedded Java virtual machine. 2003. Assistant Professor, KFPUM University, KSA.

 

TOP

THEME OPTIONS

Header type:
Theme Colors:
Color suggestions *
THEME
* May not have full accuracy!