About me

I am a doctoral candidate at ETH Zürich's Institute for Information Security under the supervision of Prof. David Basin.

My current academic interests include:

  • Data protection
  • Formalization and automated enforcement of privacy laws
  • Privacy by Design
  • Applications of formal methods to information security
  • Formal verification

I hold a MSc in Computer Science from ETH Zürich and an Engineering degree from École polytechnique (class of 2016) where I studied computer science, mathematics and economics. In 2019, I was a research intern at the University of Gothenburg in Prof. Aarne Ranta's computational linguistics group. Before that, I spent my first undergrad years at Lycée Louis-le-Grand's classes préparatoires (math, physics and CS track). I also hold a Bachelor's degree in Classics from Université Toulouse II.

Besides my academic activities, I have worked for the French Interior Ministry and the European Central Bank on data analysis projects. I am passionate about political philosophy, European integration and languages, and am an active member of Groupe d'études géopolitiques, a major European think-tank. You may want to check my personal page for more!

You can contact me per e-mail at or on Twitter, LinkedIn and Github.

Publications

Conference Formal methods

Proactive Real-Time First-Order Enforcement

François Hublet, Leonardo Lima, David Basin, Srđan Krstić, and Dmitriy Traytel
Computer Aided Verification (CAV), 2024

Modern software systems must comply with increasingly complex regulations in domains ranging from industrial automation to data protection. Runtime enforcement addresses this challenge by empowering systems to not only observe, but also actively control the behavior of target systems by modifying their actions to ensure policy compliance. We propose a novel approach to the proactive real-time enforcement of policies expressed in metric first-order temporal logic (MFOTL). We introduce a new system model, define an expressive MFOTL fragment that is enforceable in that model, and develop a sound enforcement algorithm for this fragment. We implement this algorithm in a new tool called WhyEnf and carry out a case study on enforcing GDPR-related policies. Our tool can enforce all policies from the study in real-time with modest overhead. Our work thus provides the first tool-supported approach that can proactively enforce expressive first-order policies in real time.

@InProceedings{Hublet2024c,
author={Hublet, Fran{\c{c}}ois and Lima, Leonardo and Basin, David and Krsti{\'{c}}, Sr{\dj}an and Traytel, Dmitriy"},
editor={Gurfinkel, Arie and Ganesh, Vijay},
title={Proactive Real-Time First-Order Enforcement},
booktitle={Computer Aided Verification},
year={2024},
publisher={Springer},
pages={156--181},
}

DOI: 10.1007/978-3-031-65630-9_8Authors' versionExtended versionTalk slides

Workshop Preprint

Towards an Enforceable GDPR Specification

François Hublet, Alexander Kvamme, and Srđan Krstić
Mapping and Governing the Online World (MGOW), 2024

While Privacy by Design (PbD) is prescribed by modern privacy regulations such as the EU's GDPR, achieving PbD in real software systems is a notoriously difficult task. One emerging technique to realize PbD is Runtime enforcement (RE), in which an enforcer, loaded with a specification of a system's privacy requirements, observes the actions performed by the system and instructs it to perform actions that will ensure compliance with these requirements at all times. To be able to use RE techniques for PbD, privacy regulations first need to be translated into an enforceable specification. In this paper, we report on our ongoing work in formalizing the GDPR. We first present a set of requirements and an iterative methodology for creating enforceable formal specifications of legal provisions. Then, we report on a preliminary case study in which we used our methodology to derive an enforceable specification of part of the GDPR. Our case study suggests that our methodology can be effectively used to develop accurate enforceable specifications.

@misc{Hublet2024b,
title={Towards an Enforceable GDPR Specification},
author={François Hublet and Alexander Kvamme and Srđan Krstić},
year={2024},
eprint={2402.17350},
archivePrefix={arXiv},
primaryClass={cs.CR}
}

DOI: 10.48550/arXiv.2402.17350

Conference Security Journal

User-controlled Privacy: Taint, Track, and Control

François Hublet, David Basin, and Srđan Krstić
Proceedings of Privacy Enforcing Technologies (PoPETS), 2024

In this paper, we develop the first language-based, Privacy by Design approach that provides support for a rich class of privacy policies. These policies may be user-defined, rather than programmer-defined policies, and combine fine-grained information flow policies (considering individual application inputs and outputs) with temporal constraints. Our approach, called Taint, Track, and Control (TTC), combines dynamic information-flow control with runtime enforcement to enforce these policies in the presence of malicious users and developers. We provide semantics and correctness proofs for TTC, formalized using the Isabelle/HOL proof assistant. We also implement our approach in a proof-of-concept web development framework and port three baseline applications from previous work into this framework for evaluation. Overall, our approach enforces expressive user-defined privacy policies with practical runtime performance.

@article{Hublet2024,
title={User-controlled {P}rivacy: {T}aint, {T}rack, and {C}ontrol},
author={Hublet, Fran{\c{c}}ois and Basin, David and Krsti{\'c}, Sr{\dj}an},
journal={Proceedings of Privacy Enhancing Technologies},
volume={2024},
issue={1},
year={2024}
}

DOI: 10.56553/popets-2024-0034Authors' versionTalk slidesArtifact

Conference Security

Enforcing the GDPR

François Hublet, David Basin, and Srđan Krstić
European Symposium on Research in Computer Security (ESORICS), 2023

Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently building IT support to implement such laws is difficult and the alternatives such as manual controls augmented by auditing are limited and scale poorly. This calls for developing automated enforcement techniques that can rely on a formalization of the law.

In this paper, we present the first enforceable specification of a comprehensive set of GDPR provisions, and describe an architecture that automatically enforces thisspecification in web applications. We evaluate our architecture by implementing three case studies and show that our approach incurs only modest development and runtime overhead, while covering the most relevant privacy-related aspects of GDPR that can be enforced at runtime.

@InProceedings{Hublet2023,
title="Enforcing the GDPR",
author={Hublet, Fran{\c{c}}ois and Basin, David and Krsti{\'{c}}, Sr{\dj}an},
editor={Tsudik, Gene and Conti, Mauro and Liang, Kaitai and Smaragdakis, Georgios},
booktitle={Computer Security -- ESORICS 2023},
year={2024},
publisher={Springer Nature Switzerland},
address={Cham},
pages={400--422},
}

DOI: 10.1007/978-3-031-51476-0_20Authors' versionTalk slidesArtifact

Computational linguistics Journal

IDL-PMCFG, a Grammar Formalism for Describing Free Word Order Languages

François Hublet
Journal of Logic, Language and Information (JLLI), 2022

We introduce Interleave-Disjunction-Lock parallel multiple context-free grammars (IDL-PMCFG), a novel grammar formalism designed to describe the syntax of free word order languages that allow for extensive interleaving of grammatical constituents. Though interleaved constituents, and especially the so-called hyperbaton, are common in several ancient (Classical Latin and Greek, Sanskrit...) and modern (Hungarian, Finnish...) languages, these syntactic structures are often difficult to express in existing formalisms. The IDL-PMCFG formalism combines Seki et al.’s parallel multiple context-free grammars (PMCFG) with Nederhof and Satta’s IDL expressions. We define the semantics of IDL-PMCFGs and study their expressivity, proving that IDL-PMCFG extends both PMCFG and IDL-CFG (context-free grammars equipped with IDL expressions) and that IDL-PMCFG parsing is NP-hard. We then introduce COMPĀ, a programming language extending Ranta’s Grammatical Framework (GF) and built as a high-level front-end formalism to IDL-PMCFG for practical grammar development. We present a parsing algorithm for IDL-PMCFG inspired by earlier Earley-style PMCFG parsing algorithms and Nederhof and Satta’s IDL graphs and give a worst-case estimate of its complexity as a function of several metrics on IDL expressions, the size of the input and a new notion of the G-density of a language.

@article{Hublet2022,
title={IDL-PMCFG, a Grammar Formalism for Describing Free Word Order Languages},
author={Hublet, Fran{\c{c}}ois},
journal={Journal of Logic, Language and Information},
volume={31},
number={3},
pages={327--388},
year={2022},
publisher={Springer}
}

DOI: 10.1007/s10849-022-09363-0

Conference Security

Real-time Policy Enforcement with Metric First-Order Temporal Logic

François Hublet, David Basin, and Srđan Krstić
European Symposium on Research in Computer Security (ESORICS), 2022

Correctness and regulatory compliance of today’s software systems are crucial for our safety and security. This can be achieved with policy enforcement: the process of correcting system behavior to satisfy a given policy. The enforcer’s capabilities determine which policies are enforceable.

We study the enforceability of policies specified in metric first-order temporal logic (MFOTL) with enforcers that can cause and suppress different system actions in real time. We show that a formula from an expressive safety fragment of MFOTL is enforceable if and only if it is equivalent to a formula in a simpler, syntactically defined MFOTL fragment. We propose an enforcement algorithm for all monitorable formulae (i.e., formulae whose violations can be detected by manipulating finite sets of satisfying valuations) from the latter fragment, and show that our EnfPoly enforcer tool outperforms state-of-the-art enforcers.

@InProceedings{Hublet2022b,
title={Real-Time Policy Enforcement with Metric First-Order Temporal Logic},
author={Hublet, Fran{\c{c}}ois and Basin, David and Krsti{\'{c}}, Sr{\dj}an},
editor={Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi},
booktitle={Computer Security -- ESORICS 2022},
year={2022},
publisher={Springer Nature Switzerland},
address={Cham},
pages={211--232},
}

DOI: 10.1007/978-3-031-17146-8_11Extended versionTalk slides

Security Thesis

The Databank Model

François Hublet
2021, Master's thesis, ETH Zürich

In this thesis, we design and implement the 'Databank Model', a new privacy-preserving web architecture for database-backed applications. The Databank Model aims at making the web more user-centric and safe by separating data storage fromdata processing functions. In this model, data storage and data policy enforcement are delegated to a trusted third party called the Databank, which serves as a proxy between users and applications. Application developers deploy parts of their code which interact with user data directly to the Databank. This allows them to provide their service without retrieving user data. The Databank monitors code executed against its database and prevents violations of its users’ policies. The overall infrastructure provides strong formal guarantees to users that their policies will be correctly enforced.

Through a novel combination of ideas from both information-flow monitoring and runtime verification, we design a realistic Python-like programming language called Dmol, tailored for the development of database-backed web applications. The Dmol' language features both static and dynamic information-flow propagation and uses an external monitoring backend to detect violations of users' policies, specified in a fragment of Metric First-Order Temporal Logic (MFOTL), at runtime. Noninterference properties are proved for this language and user policies are shown to be correctly enforced in the resulting execution model. We implement a prototype of the Databank infrastructure in Python and OCaml with Dmol' as a Databank-side programming language and assess the practicality of our approach in a case study.

@mastersthesis{Hublet2021,
title={The Databank Model},
author={Hublet, Fran{\c{c}}ois},
year={2021},
school={ETH Zürich}
}

DOI: 10.3929/ethz-b-000477329

Graded 6.0 (best mark). ETH medal 2022 for outstanding Master's thesis.

Student supervision

I regularly supervise semester, Bachelor's, and Master's theses at ETH's Computer Science department (Computer Science and Cyber Security programs).

If you are interested in conducting a project related to Privacy by Design, GDPR, applied logic, formal verification, programming languages... or any combination of these, feel free to get in touch. See also the overview of student projects on our group webpage.

We offer exciting research-grade topics, a welcoming atmosphere, and active supervision throughout the semester including weekly 1-2 hour meetings. We are open about new ideas and happy to share ours, so reaching out is also worth it.