CESI recherche

Samir OUCHANI

Samir OUCHANI
PhD, M.Sc, Eng in Information Security Associate Professor
(+33) 442 976 324
Ecole d’Ingénieur Informatique CESI eXia, Europole d’arbois, Aix-en-Provence 13545

S. Ouchani received the PhD degree in 2013 from the department of Computer Science & Computer Engineering, Concordia University, Canada. Currently, he is associate professor at the Engineering School of Computer Science eXia CESI, Aix-en-Provence, France.  He got the Elsevier outstanding reviewing award of March 2017. Dr. Ouchani also served as a reviewer for several conferences and journals and he maintains collaborations with the industry. His research interests are: social online systems, social technical systems, cyber-physical systems, Internet of objects, formal methods, security, and data mining.

Formation
Concordia University, Montreal, Canada
May 2009 – Sep 2013,
Phd in Computer Security, department of Electrical and Computer Engineering
Université de Metz, Metz, France
Oct 2005 – Jul 2008
Master, Computer Science
SBA University, Sidi Bel Abess, Algeria
Sep 1992 – Nov 1997
B.Eng, Computer Science
Thèmes de recherche

·        Research Leader                                                                                      

 Oct 2017 – Now: Laboratoire LINEACT, CESI eXia

 

Leading research related to new challenges of big data, smart citicies, cyber physical systems, and IoT.   My objective is developing techniques based on formal methods and data mining to ensure safety and functionality of complex systems including different behavioral aspects: real time, stochastic process, etc.

 

·        Researcher                                     

May 2017 – Sep 2017: Laboratoire VERIMAG, Grenoble

 

SUCCESS project: My main roles in this project is developing techniques to secure IoT based systems including: 1) specification and verification techniques for secure IoT components and their composition, 2) verification methods and risk assessment techniques for IoT scenarios with models of human behaviour, social interactions and human-system interactions, and 3) implementation and modeling languages with algorithms for the certification of safety, availability, secrecy, and trustworthiness across from the model to the platform.

 

·        Research Associate                                 

Nov 2013 – Avr 2017: University of Luxembourg, Luxembourg

 

UNIQUE project: as a member of the Applied Security and Information Assurance Group (APSIA) from Nov 2015, I am working on UNIQUE project (Unclonable Networks for Identification using Cholesteric Emulsions). The aim of UNIQUE is to generate encryption keys from Crystal. In two months, I developed a framework to extract the main futures of Crystal and generate keys. Currently, I am developing techniques to test the uniqueness, randomness, and reliability of the generated keys. Then in the next step, the main objective is to develop a methodology to recover the key from noisy Crystal based on the entropy metrics.

 

STAST project: as a member of Security and Trust of Software Systems (SaToSS) research group between Nov 2013 and Oct 2015, I worked on STAST project (Socio-Technical Analysis of Security and Trust). In STAST, my task is to propose a formal framework in which to model socio-technical components of information systems, and to develop methodologies and algorithms in order to detect, possibly in a semi-automatic or automatic way, attacks of socio-technical nature given a model of a system. I have developed a language to describe formally the socio-technical systems. Further, I added probability and cost to the possible actions and behaviors of actors in these complex system. Furthermore, I introduced the concept of attack surfaces to evaluate the weakness of the deployed system.

 

·        Research Assistant            

Jan 2009 – Oct 2013: Ericsson&Concordia University, Canada.

 

MOBS project: The aim of MOBS is to improve the existing verification techniques by reducing their complexities. The target is to show their efficiency on security aspect of systems. My main objective is verifying hardware and software used in system engineering by using formal methods techniques especially the probabilistic model checking. To achieve this goal, I developed a security verification framework to reduce the verification cost, specifying the system requirements, and measuring the security risk for the system under verification. The proposed framework develops efficient abstraction, symmetry reduction, and compositional verification approaches that are developed with Java to verify systems modeled in Eclipse by the OMG/INCOSE standard languages especially UML and SysML behavioral diagrams. The kernel of the verification procedure is based on the PRISM model checker. The proposed verification framework is successfully applied on real systems such as: communication protocol (Real Time Streaming Protocol and Time Triggered Ethernet Protocol), online systems, and ATM machines, etc.

 

·        Research Assistant                                                               

Oct 2005 – June 2008: Metz University, France

 

I have developed a new classification framework that is based on the support vector machine. My framework is successfully applied on Biocomputing application to detect cancer in early stages. The result of this work is awarded as the best tool in the prestigious conference of Advanced Data-Mining and Application 2008.  The tool is developed by C++ in VS 2005 and Cplex library.

 

·        Research Assistant                                          

 June 1996 – Nov 1997, Sidi Bel Abbess University, Algeria

I have developed a new technique to generate automatically Fuzzy Inference System. The proposed technique is based mainly on clustering by using the similarity and Neural Networks. We applied this technique on different application area such as: systems control (arm robot), prediction (time series), and the fuzzy classification. The tool is developed by C++ and simulated in Matlab

 

Activités pédagogiques

·        Associate Professor (Engineer in Computer Science)                    

10/2017-Now, Ecole d’Ingénieur Informatique CESI eXia.

By applying problem-based learning methodology, I am responsible of all courses and levels of the Ecole d’Ingénieur Informatique CESI eXia at Aix-en-Provence.

·        Lecturer (Master and Bachelor in Information and Computer Sciences)              

2014/2016, University of Luxembourg, Luxembourg, Luxembourg.

I am responsible of two courses: IT security (Bachelor) and Information Security Basics (Master). For IT security course, I developed lectures about basic cryptographic primitives including symmetric/asymmetric cryptography, hash functions, signatures, and model-based security. And for Information Security Basics course, I developed lectures related to modeling and verification of security protocols. Further, I supervise the projects that I proposed for the course.

·        Lecturer (Master in Information and Computer Sciences)                 

Semester 2 – 2013/2014, University of Luxembourg, Luxembourg, Luxembourg.

I am responsible of Formal Methods course where I developed lectures in Process Algebra and Model Checking for graduate student.

·        Programming Teacher (Bachelor in Computer Sciences)       

Oct 2001 – Oct 2005, Ajman University of Science and Technology, Ajman, U.A.E

I taught the object oriented programming (Java, C++), data structure, algorithmic, and assembly language (TASM). In addition, I served as IT consultant for financial companies especially by developing web based solution using PHP, and SQL server.

·        Programming Teacher                        

Nov 2000 – Oct 2001, Creative Institute, Al’Ain, U.A.E.

I am a co-founder of Creative institute and a teacher of the object oriented programming (C++), computer architecture, and algorithmic.

·        Programming Teacher         

Nov 1997 – Jan 2000, Winner Institute, Tlemcen, Algeria.

I taught the object oriented programming (C++) and Algorithmic 

       

Publications

Tutorials

1. Otmane Aït Mohamed, Mourad Debbabi, Samir Ouchani:  “Security Verification of SysML Diagrams”. The 23th International Conference on Microelectronics. December 17-20, 2012, in Algiers (Algeria), IEEE ICM’12.

Journals-under review

1. Abdelaziz Khaled, Samir Ouchani, Chemseddine  Chohra, “Semantic Analysis of Social Networks in the Learning Environments”  Computers in Human Behavior, submitter on March 2018.

2. Abdelhakim Baouya, Djamal Bennouar, Otmane Ait Mohamed and Samir Ouchani: “A Reliability analysis based on probabilistic model checking for software deployment in embedded systems « , the Journal of Information and Software Technology, Elsevier, impact factor: 2.7, second round.

3. Samir Ouchani, Mourad Debbabi, Otmane Ait Mohamed: “A Call Behavior-Based Compositional Verification Framework for SysML Activity Diagrams”. Journal of Parallel Programming, Springer, impact factor: 1.158, second round.

Journals

1. Abdelhakim Baouya, Djamal Bennouar, Otmane Ait Mohamed and Samir Ouchani: “A Quantitative Verification Framework of SysML Activity Diagrams under Time Constraints », the Journal of Expert Systems and applications, Elsevier, impact factor: 3.9, April 2015.

2. Samir Ouchani, Mourad Debbabi: “Specification, Verification and Quantification of Security in Model-based Systems”. Computing Journal, Springer, 10.1007/s00607-015-0445-x, impact factor: 1. 58, Accepted on February 2015.

3. Samir Ouchani, Gabriele Lenzini: “Generating Attacks in SysML Activity Diagrams by Detecting Attack Surfaces”, Journal of Ambient Intelligence and Humanized Computing, Springer, impact factor: 1.58, Accepted on January 2015.

4. Samir Ouchani, Gabriele Lenzini, Sjouke Maw: “Security Evaluation of Socio-Technical Physical Systems”, Computers and Electrical Engineering Journal, Elsevier, impact factor: 1.57, Accepted on February 2015. 

5. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Property-Based Abstraction Framework for SysML Activity Diagrams”.  The journal of Knowledge-Based Systems -Elsevier, impact factor: 4.5, Accepted on November 2013.

6. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Formal Verification Framework for SysML Activity Diagrams”. The Journal of Expert Systems and applications, Elsevier, impact factor: 3.9, Accepted on October 2013.

7. Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed, Mourad Debbabi: “Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols”. Journal of Software, JSW 7(7): 1488-1495 (2012), impact factor: 0.8.

8. Le Thi Hoai An, Van Vinh Nguyen, Samir Ouchani: “Gene Selection for Cancer Classification Using DCA”. ISSN 1673-9418 CODEN JKYTA8. Journal of Frontiers of Computer Science and Technology. 1673-9418/2009/03(06), impact factor: 0.7. 

Conference Papers

1. Gabriele Lenzini, Samir Ouchani, Peter Roenne, Peter Ryan, Yong Geng, Jan Lagerwall, Jung HYUN NOH: “Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals”, WIFS 2017 – The IEEE Workshop on Information Forensics and Security. 

2. Karim Lounis and Samir Ouchan: “Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment”, 9th International Workshop on Practical Applications of Stochastic Modelling (PASM’17), ENTCS, Elsevier. 

3. Samir Ouchani, Gabriele Lenzini, Sjouke Maw: “Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems”, 12th International Workshop on Security and Trust Management (STM’16), LNCS, Springer. 

4. Abdelhakim Baouya, Djamal Bennouar, Otmane Ait Mohamed and Samir Ouchani: « A Formal Approach for Maintainability and Availability Assessment using Probabilistic Model Checking », the 4th Symposium on Modelling and Implementation of Complex Systems (MISC’16), LNCS, Springer. 

5. Abdelhakim Baouya, Djamal Bennouar, Otmane Ait Mohamed and Samir Ouchani: « On the Probabilistic Verification of Time Constrained SysML State Machines », the 14th International Conference on Intelligent Software Methodologies, Tools and Techniques (Somet’15), LNCS, Springer. 

6. Abdelhakim Baouya, Djamal Bennouar, Otmane Ait Mohamed and Samir Ouchani: « A Probabilistic and Timed Verification Approach of SysML State Machine Diagrams », the 12th International Symposium on Programming and Systems (ISPS’15), IEEE. 

7. Samir Ouchani, Gabriele Lenzini: “Attacks Generation By Detecting Attack Surfaces”, Procedia Computer Science, Volume 32, 2014, Pages 529-536, ISSN 1877-0509.

8. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Formal Verification Framework for BlueSpec System Verilog”. Forum on specif. & Design Languages (FDL’13).

9. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Probabilistic Verification Framework of SysML Activity Diagrams”. The 11th International Conference on Intelligent Software Methodologies, Tools and Techniques September 22-24, SoMeT 2013.

10. Marwan Ammar, Samir Ouchani, Otmane Aït Mohamed: “Symmetry Reduction of Time-Triggered Ethernet Protocol”, Procedia Computer Science, Volume 19, 2013, Pages 273-280, ISSN 1877-0509.

11. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Security Risk Assessment Framework for SysML Activity Diagrams”. The 7th IEEE Intern. Conf. on Software Security and Reliability, June 18-20, 2012, in Washington, D.C., (USA), SERE’13 IEEE.

12. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Non-Convex Classifier Support for Abstraction-Refinement Framework”. The 23th International Conference on Microelectronics. December 17-20, 2012, in Algiers (Algeria), ICM’12 IEEE.

13. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “Efficient Probabilistic Abstraction for SysML Activity Diagrams”. The 10th International Conference on Software Engineering and Formal Methods. October 1-5, 2012, Thessaloniki, Greece, SEFM 2012, LNCS Springer: 263-277. 

14. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi: “A Probabilistic Verification Framework for SysML Activity Diagrams”. IOS book series, Frontiers in Artificial Intelligence and Applications, 2012, pp: 108-123.

15. Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed: “Model-Based Systems Security Quantification”,  in 2011  International Conference on Privacy, Security and Trust, Montreal, Canada, Jul. 2011, PST 2011, IEEE: 142-149.

16. Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed, Mourad Debbabi: “Security    Estimation in Streaming Protocols”, in 2011 International Conference on Innovations in Information Technology, Abu Dhabi, UAE, INNOVATION 11, IEEE: 427–432.

17. Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi, Makan Pourzandi: “Verification of the Correctness in Composed UML Behavioural Diagrams”. Springer’s Studies in Computational Intelligence Book Series, Vol 296/2010, Pages 163-177.

18. Mohamed Mussa, Samir Ouchani, Waseem Al Sammane, Abdelwahab Hamou-Lhadj: “A Survey of Model-Driven Testing Techniques”.  The 9th International Conference on Quality Software, IEEE, CS, Jeju, Korea, 2009. 

19. Le Thi Hoai An, Van Vinh Nguyen, Samir Ouchani: “Gene Selection for Cancer Classification Using DCA”. Advanced Data Mining and Application (ADMA)-(Best Paper) 2008: LNCS Springer 62-72.

 

Thesis

1. “A Security Verification Framework for SysML Activity Diagrams”, PhD Thesis, Concordia University (Canada), Electrical and Computer Engineering Department, 2013.

2. “The Molecular conformation by Minimizing DNA Energy”, Master Thesis, Metz University (France), Computer Science Department, 2006.

3. “The Automatic Generation of Fuzzy Inference System”, Bachelor Thesis, Sidi Bel Abess University (Algeria), Computer Science Department, 1997.

 

Encadrement

·        PhDs:

1.      Probabilistic and Timed Verification of Behavioral Diagrams”, 2015, Blida University, Blida, Algeria.

·        Masters:

1.      Accurate Semi-Automated Algorithm for Segmentation of Breast Tumors in Ultrasound Images”, 2013, Concordia University, Montreal, Canada.

2.       “The Functional Verification of Automotive Systems using BlueSpec System Verilog”, 2013, Concordia University, Montreal, Canada.

3.      The Automatic Generation of BlueSpec System Verilog Code”, 2013, Concordia University, Montreal, Canada.

4.      Formal Verification of Time-Triggered Ethernet Protocol”, 2012, Concordia University, Montreal, Canada.

·        Undergrad:

1.      Developing a Car-Rent System”, 2005, Ajman University of Science and Technology.