<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Research on Grégor Quétel -  Blog</title>
        <link>https://gquetel.fr/research/</link>
        <description>Recent content in Research on Grégor Quétel -  Blog</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en-uk</language>
        <lastBuildDate>Mon, 16 Mar 2026 00:00:00 +0100</lastBuildDate><atom:link href="https://gquetel.fr/research/index.xml" rel="self" type="application/rss+xml" /><item>
        <title>Parser Instrumentation for Semantic-Aware Applicative Intrusion Detection</title>
        <link>https://gquetel.fr/research/gaur/</link>
        <pubDate>Mon, 16 Mar 2026 00:00:00 +0100</pubDate>
        
        <guid>https://gquetel.fr/research/gaur/</guid>
        <description>&lt;h2 id=&#34;the-paper&#34;&gt;The paper
&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Parser Instrumentation for Semantic-Aware Applicative Intrusion Detection&lt;br&gt;
&lt;strong&gt;Authors:&lt;/strong&gt; Grégor Quetel, Pierre-François Gimenez, Thomas Robert, Laurent Pautet&lt;br&gt;
&lt;strong&gt;Venue:&lt;/strong&gt;  41st International Conference on ICT Systems Security and Privacy Protection (IFIPSEC26), 2026&lt;br&gt;
&lt;strong&gt;Abstract:&lt;/strong&gt;   Intrusion Detection Systems (IDS) are common security tools for protecting modern information systems, yet their effectiveness at detecting application-layer attacks is often limited by the semantic gap between low-level host or network observations and the actual behavior of applications.  Existing work overlooks the data collection phase and typically focuses on designing complex decision engines and preprocessing functions such as embedding-based representations. Unfortunately, these approaches incur significant computational overhead at inference time and remain brittle against adversarial inputs. In this paper, we present a parser-based instrumentation approach for application-level intrusion detection that provides lexical, syntactic and explicit semantic observation with minimal overhead. We introduce &lt;code&gt;gaur&lt;/code&gt;, an implementation for instrumenting parsers,  it produces observations during parsing by associating semantic tags to grammar rules, eliminating the need for runtime natural language processing. Our evaluation demonstrates the low overhead and collection time of our data collector. Furthermore, empirical results show that incorporating explicit semantic information into decision engines not only improves detection performance over traditional mechanisms but also enables faster inference and greater robustness than approaches relying on implicit semantic representations.&lt;br&gt;
&lt;strong&gt;Preprint:&lt;/strong&gt; Soon !&lt;br&gt;
&lt;strong&gt;The tool:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://github.com/gquetel/gaur&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://github.com/gquetel/gaur&lt;/a&gt;&lt;/p&gt;
</description>
        </item>
        <item>
        <title>ScholarSec: Targeted Google Scholar Queries for Cybersecurity Research</title>
        <link>https://gquetel.fr/research/scholarsec/</link>
        <pubDate>Mon, 23 Feb 2026 21:25:18 +0100</pubDate>
        
        <guid>https://gquetel.fr/research/scholarsec/</guid>
        <description>&lt;img src="https://gquetel.fr/images/scholarsec/featured-image.jpg" alt="Featured image of post ScholarSec: Targeted Google Scholar Queries for Cybersecurity Research" /&gt;&lt;h2 id=&#34;motivation&#34;&gt;Motivation
&lt;/h2&gt;&lt;p&gt;When looking for related work for my PhD, Google Scholar is my go-to search engine. However, its results can be overwhelming. Citation counts alone are not always a reliable heuristic for paper quality. To narrow things down, one can use the &lt;code&gt;source:&lt;/code&gt; operator in a query to filter by venue name. Ultimately that&amp;rsquo;s what I did. Over time, I had this saved search string that I would prefix every scholar search with. Now, I don&amp;rsquo;t know everyone&amp;rsquo;s workflow when it comes to literature review but I thought I could share this string with the community, or even better, provide a tool to build such a string according to your targeted cybersecurity conferences.&lt;/p&gt;
&lt;h2 id=&#34;scholarsec&#34;&gt;ScholarSec
&lt;/h2&gt;&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://scholarsec.gquetel.fr&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;ScholarSec&lt;/a&gt; is a small web app that does that. It builds targeted Google Scholar queries filtered by cybersecurity conference venues: you type your keywords, select the conferences you are interested in and it generates the corresponding Google Scholar query.&lt;/p&gt;
&lt;figure&gt;&lt;img src=&#34;https://gquetel.fr/images/scholarsec/keyword-box.png&#34;
    alt=&#34;Keyword input box&#34; width=&#34;60%&#34;&gt;&lt;figcaption&gt;
      &lt;p&gt;Keyword input box for building the search query.&lt;/p&gt;
    &lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;Conferences are organized by tiers following the &lt;a class=&#34;link&#34; href=&#34;https://portal.core.edu.au/conf-ranks/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;CORE 2026 ranking&lt;/a&gt;, so you can quickly select all venues at a given quality level (A*, A, B, C) or pick individual ones.&lt;/p&gt;
&lt;figure&gt;&lt;img src=&#34;https://gquetel.fr/images/scholarsec/filters.png&#34;
    alt=&#34;Conference tier filters&#34; width=&#34;60%&#34;&gt;&lt;figcaption&gt;
      &lt;p&gt;Conference selection by tiers (A*, A, B, C).&lt;/p&gt;
    &lt;/figcaption&gt;
&lt;/figure&gt;

&lt;figure&gt;&lt;img src=&#34;https://gquetel.fr/images/scholarsec/single-conference-checked.png&#34;
    alt=&#34;Individual conference selection&#34; width=&#34;60%&#34;&gt;&lt;figcaption&gt;
      &lt;p&gt;Individual conference selection.&lt;/p&gt;
    &lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;Once the query is built, you can either launch the search directly or copy it to your clipboard. The conference data is maintained in a YAML file following the conventions of the &lt;a class=&#34;link&#34; href=&#34;https://sec-deadlines.github.io/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;sec-deadlines&lt;/a&gt; project.&lt;/p&gt;
&lt;p&gt;Disclaimer: Google Scholar imposes a maximum length on &lt;code&gt;source:&lt;/code&gt; filters, so most of the conference search string had to be abbreviated to fit within that constraint. While I manually verified that the number of papers retrieved for a given year through the filter made sense and was of the same order of magnitude as the proceedings, I didn&amp;rsquo;t automatically verify that the chosen source string was fully exhaustive.&lt;/p&gt;
&lt;h2 id=&#34;contributing&#34;&gt;Contributing
&lt;/h2&gt;&lt;p&gt;If you do find a mistake, a better source string or want to add a conference that you feel is suited, feel free to open a pull request on &lt;a class=&#34;link&#34; href=&#34;https://github.com/gquetel/ScholarSec&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;GitHub&lt;/a&gt;. Also, don&amp;rsquo;t hesitate to fork this project or adapt it to your domain. For any other question, don&amp;rsquo;t hesitate to reach out via &lt;a class=&#34;link&#34; href=&#34;https://x.com/Gqutl&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;X&lt;/a&gt; or &lt;a class=&#34;link&#34; href=&#34;https://mastodon.social/@gquetel@mastodon.social&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Mastodon&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Banner image&lt;/strong&gt;: Louis-Maurice Boutet de Monvel (1935), (Detail of) La Vision et l’Inspiration de Jeanne d’Arc. Musée des Beaux Arts d&amp;rsquo;Orléans.&lt;/p&gt;
</description>
        </item>
        <item>
        <title>Superviz25-SQL: High-Quality Dataset to Empower Unsupervised SQL Injection Detection Systems</title>
        <link>https://gquetel.fr/research/superviz25/</link>
        <pubDate>Fri, 26 Sep 2025 00:00:00 +0100</pubDate>
        
        <guid>https://gquetel.fr/research/superviz25/</guid>
        <description>&lt;h2 id=&#34;the-paper&#34;&gt;The paper
&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Superviz25-SQL: High-Quality Dataset to Empower Unsupervised SQL Injection Detection Systems&lt;br&gt;
&lt;strong&gt;Authors:&lt;/strong&gt; Grégor Quetel, Eric Alata, Pierre-François Gimenez, Thomas Robert, Laurent Pautet&lt;br&gt;
&lt;strong&gt;Venue:&lt;/strong&gt;  Assessment with New methodologies, Unified Benchmarks, and environments, of Intrusion detection and response Systems (ANUBIS) at ESORICS 2025.
&lt;strong&gt;Abstract:&lt;/strong&gt; The digitalization of public and private services has led to more sophisticated and serious cybersecurity threats. Among them, SQL injection attacks leverage user inputs to remotely execute malicious actions on a database, such as data exfiltration and deletion, or privilege escalation. They are regularly classified as one of the most prominent threats to web services. Intrusion detection systems are widely used to detect such injection attacks and react to them, but it is difficult to assess their actual effectiveness and compare them because of a lack of high-quality datasets. Current SQL injection detection datasets lack diversity, are poorly documented, and the generated samples are not representative of real-world infrastructures.  This article presents a new dataset Superviz25-SQL, whose design is structured around four quality dimensions: realism, diversity, benchmarking capabilities and the presence of good documentation. We examine the dataset diversity using lexical, syntactic and semantic metrics, and demonstrate that its size is sufficient to evaluate data-intensive detectors. Finally, we provide nine classical and state-of-the art SQL injection detection pipelines as baselines for future works.&lt;br&gt;
&lt;strong&gt;Pre-print:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://hal.science/hal-05314211&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://hal.science/hal-05314211&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;The dataset:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://zenodo.org/records/17086037&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://zenodo.org/records/17086037&lt;/a&gt;&lt;/p&gt;
</description>
        </item>
        
    </channel>
</rss>
