....................,,.... .. .,,,,*,,,***////((##############(((((((//***,,..
...........,............. ... .. .***,,*,,,*//(###%%%%%%%%%%##########((((((((/////*,,. .
........................ . .... .... ,****,,,**//(#%%%%%%%%%%%%%%###########(((((((((((////*,... .
...................,.... .. ....*,***,*,*//(#%%&&&&%%%%%%%#############((((((((((((((////*,. ..
...................,.... ...... .....,,,,,***//(#%&&&&&&%%%%%%%%%###########((((((((((((((////**,.. ....
......,................. .......,,,.,,,**/(#%%&&&&&&%%%%%%%%%%%#####(((((((((((((//((//////**,.. ....
....,,,,,............... .... ...,.....,,*,,*,*/#%&&&&&%%%%%%%%%%%%%%%######(((((((((((((((///////***,.. ....
.....,,,,.............. ... ..(&&#,...,,,,,,,,*(&&&%%%%%##(((//*/*/(((####(((((((((((((((((//////*****,,. ..... ..........
.................... ... ..../&&#,...,,,**,,*(&&&&&&%%%####(//*,,,,,,*//((((((((((((/////////////******,. .,,,,,,,... ..... ......
................. . .. ..,*((#&@&(...,******/%&&&&&%%%%%%###(//***,,,,**///////////***,,,,,,,*********,,. .....,..,,..,.................... ...........
................ ,&@&/ . ..**,,/%&&#,..****,**#%&&&&%#(#%%#((**,*,,,,,,**/(###(((/**.... ......,,,,,,,. .....,**,................,....................
............. .*,. ... ..,,..,(&@#,..,*****(&&&&&&%####(((/ .,....,*//#%%##(/,.... ..,******,,,,,,,.,, ..................,,,................ . . ....
.......... .. .. ... .,..,, ../&@%,./##/*//%&&&&&&&%%%%%%##(/****,,,,*(((%%%#(/*.. ..,,******,,,,,,,,,,, ............,.,,,..,,..,. .....................
.. ...... ..... .*,.. ....................,/*,.......*(#(///#%///#&&&&&&&&%%%%%%###((/////*/(#%%&%%#(/*,,. .,. .....,,,*,, ..............,,,...,..... ..................
.. ... ....................,......,,,,,,,,,,,,*************,,,******(/(%(//%&&&&&&&&&&%%%%%#####((##%%%&&&&&%#(/*,,,,,,,,,,,,,.......,,**. ... .........,,,..,,.............................
.......... ...................,,,,,,,,,,,,,,,,********************,******##%#/*/&&&&&&&&&&&&%%%%%######%%%&&&&&&&%#(/**,,******,**,,,,,,,,***, . .........,,,,,,,,,,,.........................
........ ..................,,,,,,,,,,,,,,******************,**********#%#///%#&&&&&&&&&%&&&%%%%%####%%&&&&&&&&%%#(/*********//////////*****, .. ....,,,,.,,,..,,.........................
........ ..................,.,,,,,,,,,,,*******************************#%(///(%&&&&&&&&&&%%%%%%%%%######%&%%%&&&%%#(/**,****/////////////****, .,. ....,,,,,,,,,,*#&%/,.................... .
... .,,,,,,,..,...,,,,,,,,,,,,,,,,*******************************/%%#%%%%%&&&&&&&&&&&&&&%%%%%#####%&&&&&&&&%#((//***,,*////////////*****. ...... ....,,,,,,,,,**,/%&%/,,,,,..................
.... .,******,,,,,,,,,,..,..,,,,,,,*******************************/#%#%%%%%%&&&&&&&&&&&&%%%%%#####%%%%#(/#%%#/********,**/////////********,,...,,..........,,,,,**,,**,*%@&/.,,**,.. ..... .....
..... .. .,**********,,***,,,,,,,,,..,,,,*********************************//(##(((&&&&&&&&&&&&%%%%%#%%%%%%##%&&&%%*,,...,,*,,*//////********,..,,.. .,((,,**,,.,,**,**,***,*#&&/,,//,........ ........
..........,*********************,,,,,,,,,*********************************,....,#%&&&&&&&&&&&&&&%%%%%%%%%%%%%%%#/****,,,******************,,....,......,*,,,,,,,,,,,,****((*/#&&#((/*............. ...
..........*//////*********************************************************,.....#&&&&&&&&&&&&&&&%%%%%%%%%%%%%%#(/(((*********************,,,,,,.,,/,....,**,,,,,,,,,,**,,/*,*/(#(*,.............. ...
..........*//////*********************************************************,,,**,(&&&&&&&&&&&&&&%%##%%%%#(((///*//*,,,********************,,,,,,,,*%#*....,*,....,,,,***,*/*,*(%&#/,,..,,,,.... ...,
..........*///////**,.....,******,*********/*//*****************************,*..#&&&&&&&&&&&&&%%%#((/***,.. .............,**************,,,,,,,,**#&&%/*,,*((/**,,***/*,*(///#&@%(/,....................
.........,///////**. .,****************/////////********************/*..* %&&&&&%%%%&&&%%#%#%#%%%####((/******,,......,**********,. ..,****/(&&%/****/(/*,,,**((//((/(%@@%#/,.....,**,,,,,*,.....
........../(////**,. .*************/////////////////////**********/,.. .%&&&%%%%%%%%%%%##########((//******,,,,,,,************,,...........,*#&%(*,,*/#(**/**#%(/((/(%&@&(,......,******,,......
.........,/(/////*,. .,*********//////////////////////////////***... .%&&&&%%%%%%%%%%#####(((((/**,,,,,,,,,,,,,*****,,,,,,,,,***,..,,/((/,.,#&&%/*,*(%#//*,***//((//(%%/,,,,,,,,..... ...
.........,/(/////***,. .,*****////////////////*,,***,,,,.....,**.......#%&&&%%%%%%%%%%###########(((///**,,,,,,,,,,,,,,,,,,,.............,..,/%@@&(,,,/##/,,**,*//**%@@@&..... ....
..........,//*///**. ,***//////(//////,,,.,,,,..... .... ,/,,, ., .(%%%%%%%%%%%#####%%%%%%%%%%%#((((///*//***,,,,,,,,, . ...... ......,,,,.....,.,,**(%%@@@@@@%*****,... ,/*.
..........,/////*. ,****///////////(//*....... ....,....,.,.. .../##%%%%%%%%########%%%%%%%##((////////**,,,,.,,,,*. .... .............,,**/#(&@@@@(****.........,,****,.. ...
........../((//,. . ,****////(((((((//***,.........,,. .,.,,.. ...//###%%%%%%%########(#####(((/////****,,,......,**, ......,,,/#%&@@&%#/*****.,*,.............,,,******,..
.........,*//*,. .****/////**,*,,,.,*,.,. .,,......,.. .... .(*(###%%#%%%%####(((((//****,,,,,,,,.........,,*** ..,..,/%%#(//****,,*,,,,..........................
..........*//*. ,****///,,,,..*,.,*,..... .. . ....,.. .#%*(#############((////**,,................,,****, .. ...,,,,.,,,,,,,..,.... ....,,,,,,,.
..........*(/, .********/,,,.....,*..,.... . .....,.... ,%&%*/(############((((/**,,.............,,,,***** ......,,,,,,,,,,... ..,,,,... .
..*(/. .,/***,.,.,,,,..*,,,... .,*,....,.... .., . *%&&&*/((######%%%%####((((//*,,,,,,,,,,,,,*****,* ......,,,..,,..,.. ..,,... .. .
.*/* . ,*/**,,,,*,..,......,,,,.. ...,,,... . . . .. . *%&&@&///(((######%###########(/****,,,,*******./( .,,.....,,,.,,,,,,. ..,,.,....,..
.//. .,..*/*/,.. .,,**... ... ....,.,,,... ..,*... ,.. . ./%%&&&&&%//(((################(//***********,,./(( .....,,,..,,... ............
.,(((**,,,,*,**.,..,..,. .. ........,.... . .,,.*, . .. ./#%%%%&&&&&#/((((####(((((###(/************, .(((( .,,,..,,... ... ..,....
.,*/(/**,,,.,,,*.,,,./,*,/. ...... .. ,,.. ., ,..,.. . .*/%%%%&&&%%%%%(/(((((((((((((//*********,,. ,((((/ ....... .,........
/(///,..,,**,,**,.,,,,*,,,,.... ,..,.,... .,,.. ...,.,,*... . .*/(%%%%&&%%%%%%%%(///((/////***********,. .((((((* ... .... ....
#**..,.,*,..**.,,.......,,.. . . ... . .,.... ..,*,,.. ... .....*//(#%%%%%%%%%%%%%%%%(*//////**********...##((((((. ... ..........
..,.***,,,,*.,*,. .../,.,.. . .... ..,. ....*,, .,, ......,/((((%%%%%%%%%%%%%%%%#%%(************,.,%#(((((((( .. .......
.*..,*,**,,*,.,... .. ... . .. ... ,,........,,,.,, . .,....*((((((%%%%%%%%%%%%%%%%######******,,,/%#(((####### . ......
(,,,.,*,,*,,,..,. ..... .. .. . .......... ..... . .,..,, .. ,,,..*/(((((#%%%%%%%%%%%%%%%%%########(,.*%#############( . . .,..,
.. ,.....,,,,*.... ....... ... . . .,,.... ,.. ... .,,,,,/((((((#%%%%%%%%%%%%%%%%%########/%%//((###########( .*************,,,,
,,.,***.*,,,... .... ... . .. .... ......... .... . . ./*,,,*((#((((#%%%%%%#######%%%%#(((((%(///****,,,/(######( .,*********,,,,.
*,,... .*,.,...... . .. ........ ..... .,,.,. . .. ,.. ..//*,,/(##(((((%%%#%#%#((////((//((####((((((//*,,,,*..,/(/ .. . ..*********,,,.
WISSEM SOUSSI
Zurich University of Applied Sciences (ZHAW),
University of Zurich, Department of Informatics (IFI)
Communication Systems Group
University of Zurich, Department of Informatics (IFI)
Communication Systems Group
InIT Institut für Angewandte Informationstechnologie TD,
Obere Kirchgasse 2,
8401 Winterthur,
Switzerland
Obere Kirchgasse 2,
8401 Winterthur,
Switzerland
e-mail: me (at) wsoussi (dot) com,
PGP key in wsoussi.com/pubkey.asc
PGP key in wsoussi.com/pubkey.asc
Short biography
I am a Cybersecurity research-assistant and PhD Student at the Zürich University of Applied Sciences (ZHAW), in the InIT Information Security Group. I graduated in Computer Science at Montpellier University in 2018, and I obtained the Msc in Cybersecurity at the university of Grenoble Alpes, in 2020.
The topics of my interest are: networking and telecommunication security, application of AI/ML in cybersecurity, algorithmic problem solving and software engineering.
Pubblications
2023
TopoFuzzer - A Network Topology Fuzzer for Moving Target Defense in the TelcoCloud
W Soussi, M Christopoulou, T Anagnostopoulos, G Gür, B Stiller
36th IEEE/IFIP Network Operations and Management Symposium, Miami - FL, U.S.A, May, 2023 [yet to be published]
Demo: Closed-Loop Security Orchestration in the TelcoCloud for Moving Target Defense
W Soussi, M Christopoulou, G Xilouris, E.M.d Oca, V Lefebvre, G Gür, B Stiller
36th IEEE/IFIP Network Operations and Management Symposium, Miami - FL, U.S.A, May, 2023 [yet to be published]
Root Cause and Liability Analysis in the Microservices Architecture for Edge IoT Services
O Kalinagac, W Soussi, G Gür
IEEE International Conference on Communications (ICC), Rome, Italy, May, 2023 [yet to be published]
IoMiRCA: Root cause analysis in IoT-extended 5G microservice environments
Z Heeb, O Kalinagac, W Soussi, G Gür
38th ACM/SIGAPP Symposium On Applied Computing, Tallinn Estonia, 2023 [yet to be published]
2022
Graph Based Liability Analysis for the Microservice Architecture
O Kalinagac, W Soussi, G Gür
18th International Conference on Network and Service Management (CNSM), 2022
The Impact of Manufacturer Usage Description (MUD) on IoT Security
Z Heeb, O Kalinagac, W Soussi, G Gür
1st International Conference on 6G Networking (6GNet), 2022
ETSI ZSM Driven Security Management in Future Networks
G Chollon, D Ayed, R.A Garriga, A.M Zarca, A Skarmeta, M Christopoulou, W Soussi, G Gür, U Herzog
IEEE Future Networks World Forum, 2022
2021
Moving Target Defense as a Proactive Defense Element for Beyond 5G
This EU project devised and implemented a fully automated end-to-end smart network
and service security management framework that empowers not only protection
but also trustworthiness and liability in managing 5G network infrastructures across multi-domains.
In the context of this project I worked on the protection of network slices using deepRL-enhanced Moving Target Defense (MTD) strategies.
- Measurements on the feasibility of large-scale vulnerability notifications
- Implementation of Pollard Kangaroo for Discrete Log solving
- Formal verification of cryptographic protocols with Tamarin prover
- Generic Second Pre-image attack on long messages for narrow-pipe MD hash functions
W Soussi, M Christopoulou, G Xilouris, G Gür
in IEEE Communications Standards Magazine, vol. 5, no. 3, pp. 72-79, September, 2021
AI-Enabled Slice Protection Exploiting Moving Target Defense in 6G Networks
M Christopoulou, W Soussi, G Xilouris, G Gür, E.M de Oca, H Koumaras, B Stiller
2021 Joint 30th EuCNC & 6G Summit, Porto, Portugal, 8-11 June, 2021
2020
Feasibility of Large-Scale Vulnerability Notifications after GDPR
W Soussi, M Korczynski, S Maroofi, A Duda
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW ), 2020
Projects
[2020-2022]
INSPIRE-5Gplus (EU-Horizon 2020 project)This EU project devised and implemented a fully automated end-to-end smart network
and service security management framework that empowers not only protection
but also trustworthiness and liability in managing 5G network infrastructures across multi-domains.
In the context of this project I worked on the protection of network slices using deepRL-enhanced Moving Target Defense (MTD) strategies.
2020 (M.Sc related project)
- Real time detector of Phishing websites (M.Sc thesis)- Measurements on the feasibility of large-scale vulnerability notifications
- Implementation of Pollard Kangaroo for Discrete Log solving
- Formal verification of cryptographic protocols with Tamarin prover
2019
- Square attack on 3.5 rounds version of AES- Generic Second Pre-image attack on long messages for narrow-pipe MD hash functions