Hi!
I am a research scientist at Inria (Rennes, France) in the PIRAT research team (ex-CIDRE) and a member of the LHS laboratory at Rennes. I work mostly on intrusion detection systems (IDS), and on how to make them more reliable, more usable, and more assessable:
- by designing new XAI tools to explain behavioral, semi-supervised IDS
- by proposing new representations of cybersecurity data (network communications, malware dynamic analysis, etc.)
- by devising new techniques of synthetic network traffic generation based on explainable AI and data mining
I am hiring!
- PhD position on transfer learning for network data generation (with DGA), starting September 2025
- PhD position on network intrusion detection systems using auto-encoders (with the start-up Custocy), starting 2025
Future events
I am co-organizing the ANUBIS workshop at ESORICS25 on the evaluation of intrusion detection systems. Submission deadline is June 7th.
Ongoing collaborations
SecGen (2023-2025)
I am the PI (principal invertigator) of SecGen, an associate team (“Équipe Associée”) between Inria and CISPA (Saarbrücken, Germany). Security datasets are essential for research, but their quality is disputed: age, lack of diversity, human errors, etc. We propose to generate synthetic data to alleviate such issues. We plan to use data mining to generate network traces with proper temporal dependencies to generate more faithful data with less training data. This dataset will be evaluated with the performances of a network intrusion detection system.
DeceptIA (2025-2027)
DeceptIA is an associate team between Inria, DFKI (Germany) and Osaka Metropolitan University (Japan). It seeks to answer the following research questions: what are the characteristics of new anomalous traffic observed in large-scale honeypots deployed across multiple geolocations and services? How can we make honeypots adapt on-the-fly to the attacker’s behavior and also evolve interaction between them? How can we develop an effective phishing detection system that not only accurately identifies phishing attacks, but also educates and explains the risks to end-users in a way that increases their awareness and resilience to future phishing attempts?
Superviz (2022-2028)
Superviz is a project of the PEPR Cybersécurité. It addresses the following challenges: (i) the increase in the number and diversity of objects, (ii) the complexity of interconnected systems, (iii) the existence of increasingly complex and silent targeted attacks, and (iv) the treatment of massive attacks which rapidly affect a significant number of victims.
REV (2023-2028)
REV is a project of the PEPR Cybersécurité. It addresses the following challenges: (i) holistic vulnerability analysis, from hardware to software to communications, (ii) characterization and understanding of the degrees of exploitation and the ability to circumvent modern protections, and (iii) vulnerability analysis’s legal aspects (ethical issues, fairness of digital evidence).
DefMal (2022-2028)
The DefMal project focuses on the fight against malware: a subject that affects the entire digital environment, including connected objects (IoT), embedded systems (drones), autonomous vehicles (cars), industrial systems (ICS/Scada) and, of course, the entire IT infrastructure (cloud, smartphones, firmware).
Other collaborations
I regularly work with researchers from:
- DGA-MI and AMIAD (Bruz) on intrusion detection
- Institut Mines-Télécom (Palaiseau) on data generation
- IRIT (Toulouse) on machine learning
- LAAS-CNRS (Toulouse) on formal language theory applied to security
Recent publications
Certifiably robust malware detectors by design
Gimenez, P. F., Sivaprasad, S. & Fritz, M., (2025 May). Certifiably robust malware detectors by design. In the 40th International Conference on ICT Systems Security and Privacy Protection (IFIPSEC25)
Towards programming languages free of injection-based vulnerabilities by design
Alata, E. & Gimenez, P. F., (2025 May). Towards programming languages free of injection-based vulnerabilities by design. In the 11th Workshop on Language-theoretic Security and Applications (LangSec25).
TADAM: Learning Timed Automata From Noisy Observations
Cornanguer, L. & Gimenez, P. F., (2025 May). TADAM: Learning Timed Automata From Noisy Observations. In the SIAM International Conference on Data Mining (SDM25).
FlowChronicle: Synthetic Network Flow Generation through Pattern Set Mining
Cüppers, J., Schoen, A., Blanc, G. & Gimenez, P. F., (2024, December). FlowChronicle: Synthetic Network Flow Generation through Pattern Set Mining Generation. In the 20th International Conference on emerging Networking EXperiments and Technologies (CoNEXT).
Learning Conditional Preference Networks: an Approach Based on the Minimum Description Length Principle
Gimenez, P. F., & Mengin, J. (2024). Learning Conditional Preference Networks: an Approach Based on the Minimum Description Length Principle. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI).
Contact
Office F434
Centre Inria de l’Université de Rennes
Campus de Beaulieu, 263 Av. Général Leclerc, 35042 Rennes
pierre-francois.gimenez@inria.fr