EN FR
EN FR
CTRL-A - 2025

2025‌​‌Activity reportProject-TeamCTRL-A​​

RNSR: 201421117X
  • Research center​​​‌ Inria Centre at Université‌ Grenoble Alpes
  • In partnership‌​‌ with:Université de Grenoble​​ Alpes
  • Team name: Control​​​‌ for safe Autonomic computing‌ systems
  • In collaboration with:‌​‌Laboratoire d'Informatique de Grenoble​​ (LIG)

Creation of the​​​‌ Project-Team: 2017 June 01‌

Each year, Inria research‌​‌ teams publish an Activity​​ Report presenting their work​​​‌ and results over the‌ reporting period. These reports‌​‌ follow a common structure,​​​‌ with some optional sections​ depending on the specific​‌ team. They typically begin​​ by outlining the overall​​​‌ objectives and research programme,​ including the main research​‌ themes, goals, and methodological​​ approaches. They also describe​​​‌ the application domains targeted​ by the team, highlighting​‌ the scientific or societal​​ contexts in which their​​​‌ work is situated.

The​ reports then present the​‌ highlights of the year,​​ covering major scientific achievements,​​​‌ software developments, or teaching​ contributions. When relevant, they​‌ include sections on software,​​ platforms, and open data,​​​‌ detailing the tools developed​ and how they are​‌ shared. A substantial part​​ is dedicated to new​​​‌ results, where scientific contributions​ are described in detail,​‌ often with subsections specifying​​ participants and associated keywords.​​​‌

Finally, the Activity Report​ addresses funding, contracts, partnerships,​‌ and collaborations at various​​ levels, from industrial agreements​​​‌ to international cooperations. It​ also covers dissemination and​‌ teaching activities, such as​​ participation in scientific events,​​​‌ outreach, and supervision. The​ document concludes with a​‌ presentation of scientific production,​​ including major publications and​​​‌ those produced during the​ year.

Keywords

Computer Science​‌ and Digital Science

  • A1.1.1.​​ Multicore, Manycore
  • A1.1.2. Hardware​​​‌ accelerators (GPGPU, FPGA, etc.)​
  • A1.1.4. High performance computing​‌
  • A1.1.5. Exascale
  • A1.3.5. Cloud​​
  • A1.3.6. Fog, Edge
  • A1.6.​​​‌ Green Computing
  • A2.1.9. Synchronous​ languages
  • A2.2. Compilation
  • A2.3.1.​‌ Embedded systems
  • A2.5.1. Software​​ Architecture & Design
  • A2.5.2.​​​‌ Component-based Design
  • A2.5.4. Software​ Maintenance & Evolution
  • A2.6.2.​‌ Middleware
  • A2.6.4. Ressource management​​
  • A4.1.2. Hardware attacks
  • A4.9.​​​‌ Security supervision
  • A4.9.1. Intrusion​ detection
  • A4.9.2. Alert correlation​‌
  • A4.9.3. Reaction to attacks​​
  • A6.1.2. Stochastic Modeling
  • A6.2.4.​​​‌ Statistical methods
  • A6.4. Automatic​ control
  • A8.2.1. Operations research​‌
  • A8.2.6. Numerical methods for​​ optimization
  • A8.9. Performance evaluation​​​‌
  • A9.17. Cybersecurity and AI​

Other Research Topics and​‌ Application Domains

  • B4.5. Energy​​ consumption
  • B4.5.1. Green computing​​​‌
  • B5.1. Factory of the​ future
  • B6.1. Software industry​‌
  • B6.1.1. Software engineering
  • B6.1.2.​​ Software evolution, maintenance
  • B6.4.​​​‌ Internet of things
  • B6.5.​ Information systems
  • B9.8. Reproducibility​‌

1 Team members, visitors,​​ external collaborators

Research Scientists​​​‌

  • Eric Rutten [Team​ leader, INRIA,​‌ Researcher, HDR]​​
  • Sophie Cerf [INRIA​​​‌, ISFP, from​ Aug 2025]
  • Thierry​‌ Gautier [INRIA,​​ Researcher, from Sep​​​‌ 2025, HDR]​
  • Clement Mommessin [INRIA​‌, Starting Research Position​​]

Faculty Members

  • Stephane​​​‌ Mocanu [Team leader​, GRENOBLE INP,​‌ Associate Professor Delegation,​​ from Dec 2025,​​​‌ HDR]
  • Raphaël Bleuse​ [UGA, Associate​‌ Professor Delegation, from​​ Sep 2025]
  • Raphaël​​​‌ Bleuse [UGA,​ Associate Professor, until​‌ Aug 2025]
  • Gwenaël​​ Delaval [UGA,​​​‌ Associate Professor]
  • Stephane​ Mocanu [GRENOBLE INP​‌, Associate Professor Delegation​​, from Sep 2025​​​‌ until Nov 2025,​ HDR]
  • Stephane Mocanu​‌ [GRENOBLE INP,​​ Associate Professor, until​​​‌ Aug 2025, HDR​]

Post-Doctoral Fellow

  • Jolahn​‌ Vaudey [LIG,​​ from Oct 2025]​​​‌

PhD Students

  • Omayma Alla​ [UGA]
  • Robin​‌ Chaussemy [INRIA,​​ from Oct 2025]​​​‌
  • Kouds Halitim [INRIA​]
  • Lea Astrid Kenmogne​‌ Mekemte [UGA]​​
  • Elian Loraux [UGA​​, from Oct 2025​​​‌]
  • Nathan Rabier [‌INRIA, from Nov‌​‌ 2025]
  • Jolahn Vaudey​​ [Grenoble-INP, until​​​‌ Sep 2025]

Technical‌ Staff

  • Jonathan Bleuzen [‌​‌INRIA, Engineer]​​

Interns and Apprentices

  • Mahmoud​​​‌ Abdo [INRIA,‌ Intern, from Feb‌​‌ 2025 until Aug 2025​​]
  • Robin Chaussemy [​​​‌INRIA, Intern,‌ from Mar 2025 until‌​‌ Aug 2025]
  • Alexis​​ Detroyat [INRIA,​​​‌ Intern, from May‌ 2025 until Jul 2025‌​‌]
  • Alexis Detroyat [​​INRIA, Intern,​​​‌ from Mar 2025 until‌ Apr 2025]
  • Alexis‌​‌ Detroyat [INRIA,​​ Intern, until Feb​​​‌ 2025]
  • Mohamed Abdeldjalil‌ Maziz [INRIA,‌​‌ Intern, from Feb​​ 2025 until Aug 2025​​​‌]

Administrative Assistants

  • Marie-Anne‌ Dauphin-Rizzi [INRIA]‌​‌
  • Maria Immaculada Presseguer [​​INRIA]

External Collaborator​​​‌

  • Bogdan Robu [UGA‌]

2 Overall objectives‌​‌

Objective: control support for​​ autonomic computing

Ctrl-A is​​​‌ motivated by the observation‌ that computing systems, large‌​‌ (data centers) or small​​ (embedded), are more and​​​‌ more required to be‌ adaptive to the dynamical‌​‌ fluctuations of their environments​​ and workloads, evolutions of​​​‌ their computing infrastructures (mobile,‌ shared, or subject to‌​‌ faults), or changes in​​ application modes and functionalities.​​​‌ Their administration, traditionally managed‌ by human system administrators,‌​‌ needs to be automated​​ in order to be​​​‌ efficient, safe and responsive.‌ Autonomic Computing 40 is‌​‌ the approach that emerged​​ in the early 2000's​​​‌ in distributed systems to‌ answer that challenge, in‌​‌ the form of feedback​​ loops for self-administration control.​​​‌ These loops address objectives‌ like self-configuration (e.g. in‌​‌ service-oriented systems), self-optimization (resource​​ consumption management e.g., energy),​​​‌ self-healing (fault-tolerance, resilience), self-protection‌ (security and privacy).

Therefore,‌​‌ there is a pressing​​ and increasing demand for​​​‌ methods and tools to‌ design controllers for self-adaptive‌​‌ computing systems, that ensure​​ quality and safety of​​​‌ the behavior of the‌ controlled system. The critical‌​‌ importance of the quality​​ of control on performance​​​‌ and safety in automated‌ systems, in computing as‌​‌ elsewhere, calls for a​​ departure from traditional approaches​​​‌ relying on ad hoc‌ techniques, often empirical, unsafe‌​‌ and application-specific solutions.

The​​ main objective of the​​​‌ Ctrl-A project-team is to‌ develop a novel framework‌​‌ for model-based design of​​ controllers in Autonomic Computing,​​​‌ exploiting techniques from Control‌ Theory 37, particularly‌​‌ Discrete Event Systems 46​​, but also other​​​‌ forms. We want to‌ contribute generic Software Engineering‌​‌ methods and tools for​​ developers to design appropriate​​​‌ controllers for their particular‌ reconfigurable architectures, software or‌​‌ hardware, and integrate them​​ at middleware level. We​​​‌ want to improve concrete‌ usability of techniques from‌​‌ Control Theory by specialists​​ of computing systems 11​​​‌, and to provide‌ tool support for our‌​‌ methods in the form​​ of specification languages and​​​‌ compilers, as well as‌ software architectures.

We address‌​‌ policies for self-configuration, self-optimization​​ (resource management, low power),​​​‌ self-healing (fault tolerance) and‌ self-protection (security).

3 Research‌​‌ program

Modeling and control​​ techniques for autonomic computing​​​‌

Our research activity is‌ mainly targeted at models‌​‌ and architectures, with also​​​‌ a notable part devoted​ to applications and case​‌ studies, in co-operations with​​ specialists of the application​​​‌ domains, either academic researchers​ or industrial partners (e.g.,​‌ CEA, Orange labs, RTE,​​ Qarnot Computing, Naval Group).​​​‌ We adopt a strategy​ of parallel investigation of,​‌ on the one hand,​​ generic models and tools​​​‌ for the design support​ for control in Autonomic​‌ Computing, and, on the​​ other hand, experimental identification​​​‌ of needs and validation​ of proposals. Therefore we​‌ have activities related to​​ several application domains, for​​​‌ each of which we​ build co-operations with specialists,​‌ for example middleware platforms​​ for Cloud systems 3​​​‌, HPC architectures (e.g.,​ multi-core 15), Dynamic​‌ Partial Reconfiguration in FPGA-based​​ hardware 9 and the​​​‌ IoT and smart environments​ 47 .

The main​‌ objective of Ctrl-A translates​​ into a number of​​​‌ scientific axes :

  • Design​ support for Control in​‌ Autonomic Computing : under​​ the angle of Models​​​‌ and control (e.g., Discrete​ Event Systems and reactive​‌ languages), or at the​​ level of Software Components​​​‌ and Architectures (e.g., for​ separation of concerns, coordination​‌ of multiple autonomic managers​​ : Control, ML, RJMS,​​​‌ or application/infrastructure-levels);
  • Self-adaptative distributed​ systems and Cloud-Edge/HPC :​‌ e.g., RJMS-level dynamical resource​​ harvesting in HPC clusters​​​‌ ; node-level energy management​ through RAPL ; reproducibility​‌ of experimental validation.
  • CyberSecurity​​ & Self-protection in Industrial​​​‌ Control Systems : intrusion​ detection ; automated risk​‌ analysis ; validation of​​ conformity to IEC 62443​​​‌ standard; self-protection, resilience and​ reaction by self-reconfiguration ;​‌ applications to Smart-Grid infrastructures​​ ; experimental lab.

Achieving​​​‌ the goals of Ctrl-A​ requires multidisciplinarity and expertise​‌ from several domains. The​​ expertise in Autonomic Computing​​​‌ and programming languages is​ covered internally by members​‌ of the Ctrl-A team.​​ On the side of​​​‌ theoretical aspects of control,​ we have active external​‌ collaborations with researchers specialized​​ in Control Theory, in​​​‌ the domain of Discrete​ Event Systems as well​‌ as in classical, continuous​​ control. Additionally, an important​​​‌ requirement for our research​ to have impact is​‌ to have access to​​ concrete, real-world computing systems​​​‌ requiring reconfiguration control. We​ target autonomic computing at​‌ different scales, in embedded​​ systems or in cloud​​​‌ infrastructures, which are traditionally​ different domains. This is​‌ addressed by external collaborations,​​ with experts in either​​​‌ hardware or software platforms,​ who are generally missing​‌ our competences on model-based​​ control of reconfigurations.

4​​​‌ Application domains

We tackle​ the problem of designing​‌ well-regulated and efficient self-adaptive​​ computing systems by the​​​‌ development of novel strategies​ for their runtime management.​‌ Therefore the kind of​​ application domains that we​​​‌ typically target involve computing​ systems with relatively coarse-grain​‌ computation tasks (e.g. image​​ processing or HPC tasks,​​​‌ components or services, control​ functions in Industrial Control​‌ Systems). They must be​​ run on distributed heterogeneous​​​‌ architectures. Runtime, unpredictable variations​ can come from the​‌ environment (e.g., data values,​​ user inputs, physical sensors),​​​‌ the application (e.g., functional​ modes depending on algorithm​‌ progress, computation phases, or​​ business processes), or the​​​‌ infrastructure (e.g., resource overload,​ faults, temperature variations, communication​‌ network variations, cyber-attacks).

The​​ general control problem then​​ consists of deciding at​​​‌ runtime the choice of‌ which implementation or version‌​‌ of tasks to dynamically​​ deploy or redeploy on​​​‌ which computing resources, in‌ order to enforce high-level‌​‌ strategies involving objectives in​​ terms of constraints, optimization,​​​‌ logical invariance or reachability.‌ The design of such‌​‌ controllers involves the design​​ of appropriate sensors and​​​‌ actuators in the computing‌ infrastructures. It is based‌​‌ on the use of​​ modeling and decision formalisms​​​‌ of different kinds according‌ to the application characteristics.‌​‌

The objectives of Ctrl-A​​ are achieved and evaluated​​​‌ in both of our‌ main application domains, thereby‌​‌ exhibiting their similarities from​​ the point of view​​​‌ of reconfiguration control.

Self-adaptive‌ and reconfigurable computing systems,‌​‌ in Cloud-Edge and HPC​​

One main application domain​​​‌ for the research of‌ Ctrl-A concerns Cloud-Edge and‌​‌ High-Performance Computing. In these​​ contexts, tasks can be​​​‌ achieved following a choice‌ of implementations or versions,‌​‌ such as in, e.g.,​​ service oriented approaches. Each​​​‌ implementation has its own‌ characteristics and requirements, e.g.,‌​‌ w.r.t. resources consumed and​​ QoS offered. The systems​​​‌ execution infrastructures present heterogeneity,‌ with different computing processors,‌​‌ a variety of peripheral​​ devices (e.g., I/O, video​​​‌ port, accelerators), and different‌ means of communications. This‌​‌ hardware or middleware level​​ also presents adaptation potential,​​​‌ e.g., in varying quantities‌ of resources or sleep‌​‌ and stand-by modes.

The​​ kinds of control problems​​​‌ encountered in these self-adaptive‌ systems concern the navigation‌​‌ in the configurations space​​ defined by choice points​​​‌ at the levels of‌ applications, tasks, and architecture.‌​‌ The pace of control​​ is more sporadic, and​​​‌ slower than the instruction-level‌ computation performance inside the‌​‌ large-grain tasks.

In this​​ application area, we currently​​​‌ focus especially on the‌ runtime management of resources‌​‌ for energy objectives and​​ digital soberness, e.g. at​​​‌ the level of a‌ data-center by dynamically harvesting‌​‌ unused resources, or at​​ node level by dynamically​​​‌ adjusting frequency under QoS‌ constraints. Ongoing or recent‌​‌ cooperations in the application​​ domain feature Qarnot Computing​​​‌ (challenge Inria PULSE), Orange‌ labs, Nokia, Argonne National‌​‌ Laboratories (USA) (JLESC).

Cybersecurity​​ of Industrial Control Systems,​​​‌

We are developing applications‌ in the field of‌​‌ cybersecurity of industrial control​​ systems mainly in the​​​‌ field of intrusion detection‌ systems (IDS), reaction to‌​‌ attacks and experimental lab.​​ We are working both​​​‌ on manufacturing control systems‌ like SCADA or DCS‌​‌ (Distributed control systems) and​​ electrical substation protection systems.​​​‌

In the manufacturing systems‌ intrusion detection field, we‌​‌ worked mainly on the​​ network level detection of​​​‌ stealth process-oriented attacks i.e.‌ attacks that do not‌​‌ violate the syntax or​​ semantics of communication protocols.​​​‌ Such attacks are sending‌ legitimate controls in a‌​‌ wrong process context. We​​ developed detection frameworks for​​​‌ this type of attacks‌ by runtime-monitoring technique (PhD‌​‌ Oualid Koucham DGA ,​​ PhD Estelle Hotellier Naval​​​‌ Group) and AI techniques‌ (ongoing Léa Kenmogne PhD‌​‌ – PERP Cybersecurity Superviz).​​ Recently we started a​​​‌ study on host-based IDS‌ (ongoing Omayma Alla PhD).‌​‌ We also study the​​ intrusion detection methodologies for​​​‌ electrical substations compliant with‌ IEC 61850 standard (PhD‌​‌ Maëlle Kabir-Querrec) and the​​​‌ ongoing Jolahn Vaudey postdoc.​

On the reaction side​‌ we study the reconfiguration​​ of industrial control systems​​​‌ under attack. We developed​ a methodology compliant with​‌ IEC 62443 standard (PhD​​ Jolahn Vaudey) and we​​​‌ also worked on the​ dynamic reconfiguration and resource​‌ allocation of virtualized electrical​​ substations (Postdoc Salim Chehida).​​​‌ Recently we started a​ PhD study dedicated OT​‌ (Operational Technologies) honeypot (Elian​​ Loraux).

We also work​​​‌ on the risk assessment​ automated risk assessment and​‌ industrial systems (PhD Da​​ Silva) and we have​​​‌ an important activity on​ the development of experimental​‌ labs (G-ICS lab).

Ongoing​​ or recent cooperations in​​​‌ the application domain feature​ DGA, Naval Group, CEA,​‌ and RTE (the French​​ energy transportion company).

5​​​‌ Social and environmental responsibility​

5.1 Footprint of research​‌ activities

In the year​​ 2025, we are still​​​‌ trying to moderate the​ travels of the team.​‌ We favor submissions and​​ publications in journals.

Our​​​‌ activities in energy-efficient management​ of computing infrastructures involve​‌ running experiments on large​​ computing infrastructures such as​​​‌ Grid'5000 and GRICAD. We​ approximately spent 27,000 (Grid'5000)​‌ and 20,000 (GRICAD) core·hours​​ of computing.

In order​​​‌ to diminish or limit​ this cost, we are​‌ working towards building up​​ simulation techniques appropriately integrating​​​‌ self-adaptation and control loops,​ as well as environmental​‌ variability.

5.2 Impact of​​ research results

We have​​​‌ research activities w.r.t. energy​ efficiency in computing systems,​‌ at the levels of​​ nodes (RAPL) as well​​​‌ as at the higher​ level of computing infrastructures​‌ (RJMS, CiGri). These works​​ are contributing to a​​​‌ better mastered energy consumption​ in computing.

On a​‌ longer term, we orient​​ our research towards topics​​​‌ explicitely targeting environmental as​ well as social impacts,​‌ in the form of​​ user involvement through usage​​​‌ choices. In line with​ our topic of autonomic​‌ management, self-adaptive systems and​​ their control, for example,​​​‌ we consider control objectives​ involving trade-offs between performance​‌ or QoS and economy​​ of resources and impact,​​​‌ so that users can​ choose a level of​‌ sobriety, and possibly limited​​ or degraded quality, thereby​​​‌ allowing for potential resource​ and energy savings. Our​‌ ongoing cooperation with Qarnot​​ Computing has a potential​​​‌ for involving not only​ technical considerations but also​‌ societal and regulatory constraints,​​ or user and customer​​​‌ choices.

The perspectives involve​ the notion of computing​‌ within limits, especially when​​ they are varying dynamically,​​​‌ and which can be​ undergone (e.g., resilience when​‌ submitted to cyber-attacks or​​ faults) or chosen (e.g.,​​​‌ accepting lower quality outside​ of phases requiring higher​‌ levels due to urgency).​​ Our cooperation with RTE​​​‌ (French electricity transportation industrial),​ in the framework of​‌ the Tasting project of​​ the PEPR TASE, is​​​‌ exploring the impact of​ the notion of consumption​‌ flexibility (required from consuming​​ industries) on the management​​​‌ of computations in Data​ Centers, which is a​‌ rapidly growing consuming industry,​​ especially in Ile-de-France.

6​​​‌ Highlights of the year​

6.1 Awards

The paper​‌ “Curricula Developments regarding Industry​​ 4.0 in an Asian-European​​​‌ partnership in 3 countries​ in South-East Asia” by​‌ Chaisricharoen and al. (co-authored​​ by Stéphane Mocanu )​​ 21 obtained the best​​​‌ paper award of the‌ EAEEIE 2025 conference.

6.2‌​‌ PhD defenses

Jolahn Vaudey​​ defended his PhD “Reconfiguration​​​‌ of industrial systems as‌ a reaction to cyberattacks”‌​‌ (theses.fr/s360131) on​​ October 14th 2025.

7​​​‌ Latest software developments, platforms,‌ open data

We continue‌​‌ to maintain and develop​​ our software packages. The​​​‌ only new addition in‌ 2025 is the automatic‌​‌ PLC intrumentation code.

7.1​​ Latest software developments

7.1.1​​​‌ Heptagon

  • Keywords:
    Compilers, Synchronous‌ Language, Controller synthesis
  • Functional‌​‌ Description:

    Heptagon is an​​ experimental language for the​​​‌ implementation of embedded real-time‌ reactive systems. It is‌​‌ developed inside the Synchronics​​ large-scale initiative, in collaboration​​​‌ with Inria Rhones-Alpes. It‌ is essentially a subset‌​‌ of Lucid Synchrone, without​​ type inference, type polymorphism​​​‌ and higher-order. It is‌ thus a Lustre-like language‌​‌ extended with hierchical automata​​ in a form very​​​‌ close to SCADE 6.‌ The intention for making‌​‌ this new language and​​ compiler is to develop​​​‌ new aggressive optimization techniques‌ for sequential C code‌​‌ and compilation methods for​​ generating parallel code for​​​‌ different platforms. This explains‌ much of the simplifications‌​‌ we have made in​​ order to ease the​​​‌ development of compilation techniques.‌

    The current version of‌​‌ the compiler includes the​​ following features: - Inclusion​​​‌ of discrete controller synthesis‌ within the compilation: the‌​‌ language is equipped with​​ a behavioral contract mechanisms,​​​‌ where assumptions can be‌ described, as well as‌​‌ an "enforce" property part.​​ The semantics of this​​​‌ latter is that the‌ property should be enforced‌​‌ by controlling the behaviour​​ of the node equipped​​​‌ with the contract. This‌ property will be enforced‌​‌ by an automatically built​​ controller, which will act​​​‌ on free controllable variables‌ given by the programmer.‌​‌ This extension has been​​ named BZR in previous​​​‌ works. - Expression and‌ compilation of array values‌​‌ with modular memory optimization.​​ The language allows the​​​‌ expression and operations on‌ arrays (access, modification, iterators).‌​‌ With the use of​​ location annotations, the programmer​​​‌ can avoid unnecessary array‌ copies.

  • URL:
  • Contact:‌​‌
    Gwenaël Delaval
  • Participants:
    Gwenaël​​ Delaval, Marc Pouzet, 5​​​‌ anonymous participants
  • Partners:
    UGA,‌ ENS Paris, Inria, LIG‌​‌

7.1.2 DSL62443

  • Name:
    DSL​​ for modeling IEC 62443​​​‌ compliant ICS instances, in‌ a zone/conduit model
  • Keyword:‌​‌
    DSL
  • Functional Description:
    Source​​ code for an eclipse​​​‌ plugin, allowing the user‌ to describe ICS instances‌​‌ that follows the IEC​​ 62443 zone/conduit model. Uses​​​‌ xtext for the textual‌ IDE, and Sirius for‌​‌ the graphical one. Also​​ contains an application, using​​​‌ constraint programming to reconfigure‌ a modeled system under‌​‌ attack. This controller is​​ generated from a description.​​​‌
  • URL:
  • Contact:
    Jolahn‌ Vaudey

7.1.3 RTUShark

  • Name:‌​‌
    Modbus RTU network trafic​​ capture
  • Keyword:
    Network monitoring​​​‌
  • Functional Description:
    Allow to‌ capture Modbus RTU network‌​‌ trafic, and save it​​ in .pcap format, using​​​‌ a USB-RS485 adapter.
  • URL:‌
  • Contact:
    Stephane Mocanu‌​‌

7.1.4 GICS_HIL

  • Name:
    Hardware​​ in the loop simulation​​​‌ system
  • Keyword:
    Hardware and‌ Software Platform
  • Functional Description:‌​‌
    We offer a set​​ of electronic boards (electronic​​​‌ schematics and Gerber files‌ for PCB manufacturing) that‌​‌ enable the emulation of​​​‌ digital and analog sensors​ and actuators, thus allowing​‌ interfacing between industrial control/command/protection​​ equipment and physical process​​​‌ simulation software. The system​ core is an electronic​‌ card inspired by the​​ STM32_Discovery evaluation board. The​​​‌ embedded firmware can be​ configured to manage I/O​‌ from industrial programmable logic​​ controllers (24V digital or​​​‌ +/-10V analog) or three-phase​ current and voltage sensors​‌ compatible with electrical substation​​ protection relays. Two power​​​‌ cards allow the signals​ to be adapted to​‌ current/voltage transformer standards: 0..1​​ A and +/- 48V​​​‌ (48V instead of 110V​ for compatibility with electrical​‌ safety standards for university​​ workbench). The cards interface​​​‌ with the simulation software​ via UDP communication. Interfacing​‌ software with Factory I/O​​ and Home I/O is​​​‌ provided, as well as​ software for controlling three-phase​‌ signals. Interfacing with Matlab/Simulink​​ is direct via Simulink​​​‌ UDP blocks. Interfacing with​ Modelica is also direct​‌ via the UDPSend and​​ UDP Receive blocks of​​​‌ the DeviceDrivers.Communication package
  • URL:​
  • Publications:
  • Contact:
    Stephane Mocanu​​

7.1.5 PLCOPENXML instrumentation tools​​​‌

  • Name:
    Python scripts, instrumenting​ CEI 61131-10 PLCOPENXML files​‌ to allow for context​​ migration.
  • Keyword:
    Instrumentation
  • Functional​​​‌ Description:
    Python scripts, that​ take as input a​‌ PLCOPENXML description of a​​ PLC project. Then, for​​​‌ each application in the​ project: - Asks the​‌ user to determine its​​ limits (SFC programs and​​​‌ relevant variables) - Instrument​ the program to store​‌ the execution context in​​ an accessible area (here,​​​‌ through Modbus) - Instrument​ the program to allow​‌ migration - Store these​​ information in a serialized​​​‌ file, as a runnable​ snapshot manager. This manager​‌ can a) regularly take​​ snapshots of the corresponding​​​‌ application's state and b)​ migrate this execution context​‌ to another PLC.
  • URL:​​
  • Publication:
  • Contact:​​​‌
    Jolahn Vaudey

7.2 New​ platforms

7.2.1 G-ICS: GreEn-ER​‌ Industrial Control systems Sandbox​​

Participants: Stéphane Mocanu.​​​‌

GreEn-ER Industrial Control Systems​ Sandbox (G-ICS) is a​‌ teaching and research platform​​ that brings together a​​​‌ hundred control, command, and​ industrial supervision devices of​‌ multi-protocol and multi-manufacturer that​​ can be flexibly coupled​​​‌ with a hardware-in-the-loop simulation​ system. The software simulation​‌ of processes can be​​ carried out with commercial​​​‌ simulators (Matlab/Simulink, Dymola) or​ open-source (Scilab or Modelica)​‌ as well as with​​ virtualization environments (Factory I/O​​​‌ or Home I/O). Thus,​ system architectures covering industrial​‌ fields ranging from home​​ automation and electrical distribution​​​‌ in buildings to manufacturing​ industry and smart grids​‌ can be realized.

Hardware​​ Environment.

The platform consists​​​‌ of several distinct models.​ The following sections detail​‌ the main use cases.​​ In addition to the​​​‌ described models, a significant​ amount of automation equipment​‌ is available for custom​​ experiment realization.

2D Robot​​​‌ Models

Three Schneider MD1ADAX2M​ 2 Axis Machines educational​‌ models including two industrial​​ axes, an M340 PLC,​​​‌ two speed drives, and​ an HMI. Implemented protocols:​‌ CANOpen and Modbus/TCP.

Figure 1

The​​ image depicts a detailed​​​‌ view of an industrial​ control panel and a​‌ machine setup. The control​​ panel contains various electrical​​​‌ and electronic components such​ as switches, circuit breakers,​‌ and controllers. Labels on​​ the image identify parts​​ like the M340 automation​​​‌ unit, Ethernet switch, power‌ supplies, differential circuit breaker,‌​‌ and safety modules. The​​ machine setup includes features​​​‌ such as a multi-axis‌ system, safety interrupters, a‌​‌ transparent polycarbonate door, and​​ a marking unit. The​​​‌ control panel and machine‌ components are interconnected with‌​‌ wires and cables, and​​ the setup appears to​​​‌ be for an industrial‌ automation or manufacturing process.‌​‌ (Description generated at January​​ 18th, 2026 by Albert​​​‌ AI with the model‌ Mistral-Small-3.2-24B)

Figure 1:‌​‌ Schneider Robots Model
FischerTechnik​​ Models

Scaled-down physical processes:​​​‌ Six FischerTechnik factory simulator‌ cases1. Sensors/actuators‌​‌ interfaced with TM3BCEIP remote​​ I/O units (Figure 2​​​‌). Communication based on‌ Modbus/TCP.

Figure 2

The image displays‌​‌ a interconnected PLC network​​ centered around a FischerTechnik​​​‌ Industry 4.0 factory simulation.‌ Sensors and actuators of‌​‌ each subprocess are acquired​​ by RTU then read​​​‌ by the four PLC‌ that control the process.‌​‌ An HMI allows to​​ monitor the process state.​​​‌ Each supprocess is identified‌ by a color.

Figure‌​‌ 2: Fischer Technik​​ / Schneider Model
Hardware-in-the-Loop​​​‌ Models

About fifty programmable‌ logic controllers (PLCs) from‌​‌ Schneider, Siemens, Wago, and​​ ABB connected to electronic​​​‌ interfaces allowing coupling with‌ process simulators. Home I/O,‌​‌ Factory I/O simulator licenses​​ available or interfacing with​​​‌ Matlab/Simulink, Modelica, etc. The‌ principle is presented in‌​‌ Figure 3.

Figure 3

The​​ image depicts a centralized​​​‌ automation system with various‌ interconnected components. At the‌​‌ center there are three​​ control units linked to​​​‌ electronic interfacing cards and‌ to multiple devices and‌​‌ interfaces, including databases, personal​​ computers, HMIs. Under the​​​‌ interfacing cards are logos‌ and icons representing programming‌​‌ languages and software tools,​​ such as MATLAB Simulink,​​​‌ Python, C++, and Modelica,‌ highlighting the interfacing of‌​‌ industrial controllers with of​​ different programning technologies via​​​‌ the electronic cards.

Figure‌ 3: Hardware-in-the-Loop Model‌​‌
Multiprotocol Models

Multiprotocol models:​​ an internally made "SCADA​​​‌ suitcase" model is available‌ (10 copies - Figure‌​‌ 4). The model​​ allows studying and carrying​​​‌ out attacks on hierarchical‌ and distributed multi-protocol architectures‌​‌ (Modbus TCP, CANOpen, OPC​​ UA, Modbus RTU).

Figure 4

The​​​‌ image depicts an industrial‌ supervision and control system.‌​‌ It features a local​​ Modbus/TCP and OPC UA​​​‌ network connecting a PC‌ supervision screen to a‌​‌ network switch. The switch​​ connects to two automation​​​‌ devices, API M340 and‌ API M251, via an‌​‌ HMI (Human-Machine Interface). These​​ devices link to sensors/actuators​​​‌ through Modbus/RTU and CanOpen‌ field buses, controlling a‌​‌ piloted process. Connections include​​ both digital (TOR) and​​​‌ analog signals. (Description generated‌ at January 22nd, 2026‌​‌ by Albert AI with​​ the model Mistral-Small-3.2-24B)

Figure​​​‌ 4: Multiprotocol Model‌
Smart-grid Platform IEC 61850‌​‌

About 30 protection relays​​ and current and voltage​​​‌ measurement units are available‌ for creating models of‌​‌ protection and control infrastructures​​ for electrical networks based​​​‌ on IEC 61850 communication‌ protocols and redundant HSR‌​‌ and PRP networks. One​​ of the models constructed​​​‌ from several standalone measurement‌ units (SAMU) and protection‌​‌ relays (IED) is presented​​ in Figure 5.​​​‌ The redundant network is‌ accessible for frame capture‌​‌ and attack deployment via​​​‌ a Redundancy Box (RedBox).​

Figure 5

The image shows a​‌ network setup involving industrial​​ devices. On the left​​​‌ is a diagram with​ SCADA, PRP (Parallel Redundancy​‌ Protocol), and GOOSE (Generic​​ Object Oriented Substation Event)​​​‌ connections. Key components include​ IEDs (Intelligent Electronic Devices),​‌ SAMUs (Synchronized Measurement Units),​​ and RedBoxes. On the​​​‌ right is a rack​ with actual equipment labeled​‌ RedBox, IED, and SAMU,​​ connected by numerous wires.​​​‌ The RedBox serves as​ a network device, while​‌ IEDs and SAMUs are​​ connected to monitor and​​​‌ control electrical systems. (Description​ generated at January 18th,​‌ 2026 by Albert AI​​ with the model Mistral-Small-3.2-24B)​​​‌ (Description generated at January​ 18th, 2026 by Albert​‌ AI with the model​​ Mistral-Small-3.2-24B)

Figure 5:​​​‌ Smart-Grid Model
Safety Automation​ Tesbed

Three complete testbeds​‌ (sensors, actuators, and programmable​​ controllers) from PILZ brand​​​‌ as well as several​ Schneider and Siemens safety​‌ PLCs are available for​​ demonstrating attacks on safety​​​‌ command functions (Figure 6​).

Figure 6

The image shows​‌ a training workbench dedicated​​ to safety related control​​​‌ systems. Are visible :​ a safety Pilz PLC,​‌ an HMI, a security​​ badge reader with badges​​​‌ and various sefety sensort​ : an emergency stop,​‌ a safety gate, and​​ an enabling switch.

Figure​​​‌ 6: Safety PLC​ Testbed
Software Environment
  • Control/command​‌ component programming environments (Schneider,​​ Siemens, Pilz, ABB, Kepware)​​​‌
  • Industrial supervision software: PCVues,​ WinCC
  • OPC servers Kepware​‌ and Matrikon
Monitoring and​​ Development Tools

Wireshark available​​​‌ on all computers with​ a local partial UMAS​‌ dissector, admin access to​​ switches and the ability​​​‌ to configure additional ports​ in monitoring mode. Snort​‌ and zeek instances.

Usage​​ Constraints

The platform is​​​‌ connected to Grenoble-INP's classroom​ PCs. Although it is​‌ possible to temporarily disconnect​​ the PCs, for safety​​​‌ reasons, the deployment of​ ransomware and auto-replicating viruses​‌ will not be possible.​​ DoS attacks are possible​​​‌ under certain conditions: the​ classroom computers being connected​‌ to the model networks​​ and to the Grenoble-INP​​​‌ network, to avoid disruptions​ to the institution's network​‌ it is necessary, beforehand,​​ to physically disconnect the​​​‌ classroom computers. Dedicated computers​ (not managed by the​‌ institution) must be used​​ for DoS type attacks​​​‌ to prevent alerting Grenoble-INP's​ EDR. In order to​‌ ensure the safety of​​ the equipment we are​​​‌ not allowing destructive attacks​ (loading corrupted firmwares).

Description​‌ of Normal Use Cases​​

For industrial systems, normal​​​‌ activity corresponds to the​ normal operation of the​‌ physical process. Traffic corresponds​​ to the communication between​​​‌ industrial controllers or with​ sensors/actuators or even with​‌ industrial supervision.

Description of​​ Implemented Attacks

The implemented​​​‌ attacks are forcings of​ input values (sensors), output​‌ values (actuators), or internal​​ variables of the controllers.​​​‌ The currently supported network​ protocols are Modbus/TCP, UMAS​‌ (partially), CANOpen, GOOSE, and​​ SV (version 61850-9-2LE).

Modbus/TCP​​​‌ Attacks

This type of​ attack targets the communication​‌ network between industrial supervision​​ and programmable PLCs and​​​‌ uses writing to the​ internal variables of the​‌ PLCs via Modbus/TCP clients​​ (free software on the​​​‌ Internet or Metasploit). The​ attacks use "legitimate" commands​‌ (e.g., opening a valve​​ or stopping a motor)​​ in contexts where the​​​‌ action can damage the‌ physical process. Concrete examples‌​‌ of attacks on Modbus/TCP​​ are detailed in 41​​​‌, 43, 42‌, 38.

CANOpen‌​‌ Attacks

This type of​​ attack directly targets the​​​‌ traffic between programmable PLCs‌ and local loop controllers.‌​‌ It is currently implemented​​ only on the "2D​​​‌ Robots" model. The attack‌ consists of injecting commands‌​‌ on the CAN bus​​ that, for example, cause​​​‌ a speed drive to‌ fail or change its‌​‌ operating mode, modify or​​ stop ongoing movements, perform​​​‌ forbidden movements or movements‌ at too high speeds,‌​‌ inject false sensor values,​​ or desynchronize the movements​​​‌ of the two axes.‌ A total of 17‌​‌ types of attacks are​​ implemented and described in​​​‌ 38.

GOOSE Attacks‌

The GOOSE protocol is‌​‌ an Ethernet multicast protocol​​ used for transmitting events​​​‌ in an IEC 61850‌ electrical substation. Essentially, it‌​‌ involves triggering circuit breakers​​ (trip). The GOOSE frames​​​‌ are identified using two‌ counters (one for the‌​‌ frames and another for​​ the state changes-events). The​​​‌ attack consists of usurping‌ the legitimate sequence of‌​‌ GOOSE frames by injecting​​ frames that cause a​​​‌ circuit breaker to trip‌ (a single frame is‌​‌ sufficient). The implementation and​​ detection have been presented​​​‌ in 39.

SMV‌ Attacks

The SMV protocol‌​‌ is an Ethernet multicast​​ used for transmitting samples​​​‌ of current and voltage‌ measurements in IEC 61850‌​‌ substations. The SMV frames​​ are identified by counters.​​​‌ Two types of attacks‌ are available: injecting false‌​‌ measurements and Ethernet flooding.​​ Injecting false measurements consists​​​‌ of usurping the legitimate‌ flow of SMV and,‌​‌ therefore, injecting a flow​​ with false measurements. Ethernet​​​‌ flooding targets high availability‌ networks HSR and PRP.‌​‌ In particular, "double ring"​​ HSR networks are very​​​‌ vulnerable to Ethernet floods.‌ The attacks and their‌​‌ effects on electrical protections​​ and network infrastructures have​​​‌ been presented in 44‌ and 45.

Several‌​‌ public datasets where generated​​ on the platform.

Modbus​​​‌ Datasets

Datasets corresponding to‌ the work of Oualid‌​‌ Koucham's thesis2 are​​ available in pcap format.​​​‌ The datasets and associated‌ attacks are detailed in‌​‌ section 3.3.3 (Implementation and​​ datasets) of the thesis.​​​‌ The datasets were generated‌ on a Hardware-in-the-Loop model‌​‌ also described in the​​ thesis with Modbus/TCP attacks.​​​‌ The model is built‌ on the principle illustrated‌​‌ in the referenced figure​​ coupled with a software​​​‌ simulation of a simplified‌ version of a well-known‌​‌ physical process in control​​ engineering: the Tennessee-Eastman distillation​​​‌ column. A reduced demo‌ of the attacks and‌​‌ detection is available in​​ virtual machine format (replay​​​‌ of the datasets, deliverable‌ of the ANR ASTRID‌​‌ SACADE project).

CANOpen Datasets​​

Datasets of ModbusTCP and​​​‌ CANOpen attacks generated on‌ the 3D Robots model‌​‌ come from the thesis​​ work of Estelle Hôtellier.​​​‌ The datasets and a‌ detailed description of the‌​‌ attacks are available on​​ request.

IEC 61850 Datasets​​​‌

A dataset corresponding to‌ a type of attack‌​‌ involving the injection of​​ false trip signals in​​​‌ a GOOSE flow comes‌ from the thesis of‌​‌ Maëlle Kebir-Querrec3.​​​‌

Several datasets are available​ for attacks involving the​‌ injection of false sensor​​ values in SMV flows​​​‌ (IEC 61850) as well​ as Ethernet flood type​‌ attacks in high reliability​​ HSR/PRP networks.

7.3 Open​​​‌ data

IDS calibration and​ benchmark ICS dataset
  • Contributors:​‌
    Stephane Mocanu, Léa Kenmogne,​​ Oualid Koucham
  • Description:
    Datasets​​​‌ containing industrial traffic captured​ in a simple industrial​‌ system. Two datasets are​​ provided : normal traffic​​​‌ dataset for training of​ the Intrusion Detection System​‌ and the dataset containing​​ the process oriented attacks​​​‌ (actuators manipulation) for IDS​ banchmarking. Both datasets are​‌ provided in two versions​​ : the original network​​​‌ trafic capture (pcap file)​ and the extracted features​‌ (sensor and actuators values)​​ CVS files.
  • Dataset PID​​​‌ (DOI,...):
  • Publications:
GICS Intrusion​‌ Detection Datasets
  • Contributors:
    Oualid​​ Koucham, Stephane Mocanu
  • Description:​​​‌
    These datasets include network​ traces collected at the​‌ ENSE3 GICS platform for​​ the purposes of evaluating​​​‌ an intrusion detection system​ (IDS) for ICS. The​‌ network traces capture the​​ behavior of an ICS​​​‌ test bed under attacks​ targeting the physical process.​‌ The test bed is​​ implemented in GICS and​​​‌ is comprised of several​ controllers (Schneider M340/M580, Wago​‌ IPC-C6, Siemens, etc.) along​​ with supervisory machines, engineering​​​‌ workstations and human machine​ interfaces (HMIs). Each controller​‌ sends commands and receives​​ sensor information, via I/O​​​‌ interface cards, from a​ real-time OpenModelica simulation of​‌ a complex physical process​​ representing a complex chemical​​​‌ plant. The traces contain,​ among other protocols, Modbus​‌ traffic carrying attacks violating​​ the specifications of the​​​‌ underlying physical process. This​ is performed by sending​‌ a sequence of Modbus​​ commands from workstations to​​​‌ controllers running the control​ logics which steer the​‌ process. Two types of​​ attacks are contained in​​​‌ these datasets. The first​ type of attacks violates​‌ qualitative temporal constraints on​​ the behavior of the​​​‌ physical process. Examples of​ such attacks include opening​‌ simultaneously two valves or​​ stopping a motor before​​​‌ its due time. The​ second type of attacks​‌ violates quantitative temporal constraints.​​ For example, the traces​​​‌ include attacks that wear​ a valve by quickly​‌ opening and closing it.​​ The contents of the​​​‌ datasets is as follows:​ One capture free from​‌ attacks and containing only​​ legitimate traffic and Four​​​‌ captures containing attacks.
  • Dataset​ PID (DOI,...):
  • Publications:​‌
    42, 41

8​​ New results

8.1 Design​​​‌ support for Control in​ Autonomic Computing

8.1.1 Autonomic​‌ Resource Harvesting in HPC:​​ Control Methods and their​​​‌ Reusability

Participants: Raphaël Bleuse​, Sophie Cerf,​‌ Quentin Guilloteau, Rosa​​ Pagano, Bogdan Robu​​​‌, Eric Rutten.​

Using control theory methods​‌ to adapt to unpredictable​​ variations in resource managment​​​‌ allows for the design​ of well-founded autonomic managers.​‌ Choosing the relevant approach​​ is daunting due to​​​‌ the variety of existing​ controllers. The criteria are​‌ of different natures, involving​​ performance and efficiency, but​​​‌ also required expertise in​ control theory, and reusability​‌ or portability between sub-systems.​​ We study how reusability​​​‌ relates to the adaptivity​ and robustness properties in​‌ control. We compare various​​ control designs:

  • the classic​​ Proportional-Integral-Derivative (PID) control,
  • its​​​‌ upgrade as adaptive control,‌
  • and Model-Free Control (MFC).‌​‌

We perform experimental evaluation​​ and compare performance and​​​‌ reusability. Trade-offs are found‌ on different criteria: while‌​‌ adaptive control is largely​​ portable, its design complexity​​​‌ is significant for non-experts;‌ PID control has good‌​‌ nominal performance, yet its​​ portability is limited; MFC​​​‌ requires few competences to‌ be used, but cannot‌​‌ provide strong guarantees.

This​​ comparative study has been​​​‌ published in 17.‌

8.2 Self-adaptative distributed systems‌​‌ and Cloud-Edge/HPC

8.2.1 Mitigation​​ of I/O Congestion Using​​​‌ Control Theory

Participants: Raphaël‌ Bleuse, Sophie Cerf‌​‌, Thomas Collignon,​​ Kouds Halitim, Bogdan​​​‌ Robu, Eric Rutten‌, Lionel Seinturier,‌​‌ Alexandre van Kempen.​​

Efficient data access in​​​‌ High-Performance Computing (HPC) systems‌ is essential to the‌​‌ performance of intensive computing​​ tasks. Traditional optimizations of​​​‌ the I/O stack aim‌ to improve peak performance‌​‌ but are often workload​​ specific and require deep​​​‌ expertise, making them difficult‌ to generalize. In shared‌​‌ HPC environments, resource congestion​​ can lead to unpredictable​​​‌ performance, causing slowdowns and‌ timeouts. To address these‌​‌ challenges, a self-adaptive approach​​ based on Control Theory​​​‌ is proposed to dynamically‌ regulate client-side I/O rates.‌​‌ Our approach leverages a​​ small set of runtime​​​‌ system load metrics to‌ reduce congestion and enhance‌​‌ performance stability.

We study​​ this problem in two​​​‌ distinct experimental setups:

  1. A‌ single-node system, as a‌​‌ preliminary work 26,​​ 33.
  2. A multi-node​​​‌ cluster, where we evaluate‌ a representative workload on‌​‌ a real testbed. Experimental​​ results demonstrate that our​​​‌ method effectively mitigates I/O‌ congestion, reducing total runtime‌​‌ by up to 20%​​ and lowering tail latency,​​​‌ while maintaining stable performance.‌ These results have been‌​‌ published in 22.​​

8.2.2 Graceful application degradation​​​‌ in HPC with Power‌ Capping

Participants: Raphaël Bleuse‌​‌, Sophie Cerf,​​ Kouds Halitim, Mohamed​​​‌ Abdeldjalil Maziz, Bogdan‌ Robu, Eric Rutten‌​‌.

We study control-based​​ approaches that regulate the​​​‌ power usage of an‌ HPC application to achieve‌​‌ a graceful degradation of​​ its performance, i.e. allowing​​​‌ significant energy savings with‌ limited increase in execution‌​‌ time.

Power capping is​​ performed using the RAPL​​​‌ (Running Average Power Limit)‌ actuation and sensing mechanism,‌​‌ which is known to​​ have noise and inaccuracies.​​​‌ We address the challenges‌ of noise and actuator‌​‌ inaccuracies with an approach​​ that incorporates a cascade​​​‌ control design, allowing to‌ have an inner loop‌​‌ specially designed to ensure​​ that the actuator effisciently​​​‌ reach the desired action‌ value in a short‌​‌ time (compared to the​​ main regulation loop).

Additionaly,​​​‌ the number of processors‌ in an HPC setup‌​‌ can vary, which implies​​ that the control has​​​‌ to handle a variable‌ number of power signals‌​‌ (i.e. output) for a​​ same input. The control​​​‌ design results in a‌ robust cascade control approach.‌​‌ The system can be​​ divided into two subsystems:​​​‌ the RAPL actuator and‌ the HPC plant. The‌​‌ first subsystem is a​​ Single-Input Multiple-Output (SIMO) system​​​‌ due to the different‌ power values collected from‌​‌ power sensors, while the​​​‌ second subsystem is a​ Multiple-Input Single-Output (MISO) system​‌ between the power measures​​ and the application's progress.​​​‌

This approach of robust​ cascade control for variable​‌ dimension systems has been​​ published in 23.​​​‌

Previous works study the​ power control on various​‌ benchmarks, i.e. either compute-intensive​​ or memory-intensive. We tackled​​​‌ a more realistic scenario​ by considering a workload​‌ that vary in computational​​ intensity, alternating between compute-bound​​​‌ and memory-bound phases. Two​ adequate control strategies are​‌ explored: a gain-scheduled PI​​ controller and a H​​​‌ polytopic LPV controller,​ both modulated by a​‌ scheduling parameter, which represents​​ the ratio of compute​​​‌ to memory activity. This​ was the work done​‌ by Mohamed Abdeldjalil Maziz​​ during his internship 34​​​‌.

8.2.3 Stochastic Control​ for Resource Harvesting

Participants:​‌ Mahmoud Abdo, Raphaël​​ Bleuse, Sophie Cerf​​​‌, Kouds Halitim,​ Bogdan Robu, Eric​‌ Rutten.

This works​​ builds upon previous works​​​‌ on the Cigri/OAR composition​ to harvest idle resources​‌ in HPC clusters. One​​ promising approach is to​​​‌ fill idle resources by​ injecting small, flexible, independent,​‌ and interruptible jobs that​​ have no strict time​​​‌ constraints. However, managing the​ injection of these jobs​‌ is challenging due to​​ the uncertain nature of​​​‌ job characteristics, such as​ execution times and resource​‌ consumption. Additionally, process noise-resulting​​ from system complexity and​​​‌ the arrival and execution​ of varying external workloads-can​‌ interrupt or terminate these​​ filler jobs.

We propose​​​‌ and evaluate, using real​ data, a Stochastic Model​‌ Predictive Control (SMPC) approach​​ that addresses system uncertainty​​​‌ and incorporates a feed-forward​ compensation mechanism for disturbance​‌ rejection. The proposed algorithm​​ shows promising results: it​​​‌ ensures a platform usage​ rate of 98%, significantly​‌ improving overall resource efficiency​​ and reducing the number​​​‌ of early terminated jobs​ compared to previous work.​‌

The results were published​​ in 27. The​​​‌ formulation of the Model​ Predictive Controller has been​‌ studied by Mahmoud Abdo​​ during his internship 30​​​‌.

8.2.4 Modeling and​ Simulation of HPC Jobs​‌ Arrival

Participants: Raphaël Bleuse​​, Robin Chaussemy,​​​‌ Franck Corset.

The​ contributions of this work​‌ are twofold. First we​​ consolidate in a single​​​‌ database the exploitation traces​ of the GRICAD clusters​‌ for the past ten​​ years. The consolidation process​​​‌ merges the exploitation databases​ of each cluster's OAR​‌ database and the exploitation​​ database of the job​​​‌ injector Cigri. Second, we​ model the arrival of​‌ jobs on the platform​​ as a homogeneous Poisson​​​‌ process. We then simulate​ jobs' arrival with a​‌ marked Poisson process to​​ account for the polling​​​‌ frequency of the RJMS.​

Preliminary results are available​‌ the Master thesis of​​ Robin Chaussemy31.​​​‌ The modeling lays the​ foundation for refining control​‌ signals.

8.2.5 Flexibility in​​ Data-Centers for Digital Soberness​​​‌

Participants: Raphaël Bleuse,​ Alexis Detroyat, Clement​‌ Mommessin.

We collaborate​​ with RTE (Réseau de​​​‌ transport d'électricité) to study​ the flexibility capabilities of​‌ data-centers. One of the​​ aspect we studied is​​​‌ the adaptation of the​ computation load to a​‌ time-varying power budget. Alexis​​ Detroyat worked on the​​ characterization of the relationship​​​‌ between the power cap‌ applied to a server‌​‌ and the runtime of​​ jobs executed on that​​​‌ server. This characterization has‌ been conducted on a‌​‌ diverse set of hardware​​ from the Grid'5000 testbed​​​‌ using workloads from the‌ NAS Parallel Benchmark. This‌​‌ work allows us to​​ identify, with respect to​​​‌ the hardware, a range‌ of applicable power cap‌​‌ at a reasonable increase​​ of the execution time​​​‌ of the jobs. These‌ experiments are detailed in‌​‌ the internship report 32​​.

Such experiments are​​​‌ a step towards defining‌ ranges of flexibility to‌​‌ improve or design new​​ power-aware scheduling algorithms for​​​‌ computing platforms.

8.2.6 Performance‌ portable batched linear algebra‌​‌ kernels for transport sweeps​​ using Kokkos

Participants: Thierry​​​‌ Gautier.

The paper‌ 28 describes the development‌​‌ of performance portable batched​​ linear algebra kernels for​​​‌ SN-DG neutron transport sweeps‌ using Kokkos. We establish‌​‌ a new sweep algorithm​​ for GPUs that relies​​​‌ on batched linear algebra‌ kernels. We implement an‌​‌ optimized batched gesv solver​​ for small linear systems​​​‌ that builds upon state-of-the-art‌ algorithms. Our implementation achieves‌​‌ high performance by minimizing​​ global memory traffic and​​​‌ maximizing the amount of‌ computations done at compile-time.‌​‌ We assess the performance​​ of the batched gesv​​​‌ kernel on NVIDIA and‌ AMD GPUs. We show‌​‌ that our custom implementation​​ outperforms state-of-the-art linear algebra​​​‌ libraries on these architectures.‌ The performance of the‌​‌ new GPU sweep implementation​​ is assessed on the​​​‌ H100 and MI300A GPUs.‌ We demonstrate that it‌​‌ is able to achieve​​ high performance on both​​​‌ architectures, and is competitive‌ with an optimized multithreaded‌​‌ CPU implementation on a​​ 128-core AMD Genoa CPU​​​‌ node.

This work, published‌ in a SC'25 workshop‌​‌ last october, is the​​ subject of PhD Gabiel​​​‌ SUAU (CEA) supervised by‌ Thierry Gautier and it‌​‌ has begun in the​​ Avalon project team.

8.3​​​‌ Cybersecurity of Industrial Control‌ Systems

8.3.1 Safety-Security Convergence:‌​‌ Automation of IEC 62443-3-2​​

Participants: Da Silva Mike​​​‌, Stephane Mocanu,‌ Maxime Puys, Thevenon‌​‌ Pierre-Henri.

We develop​​ a method to automate​​​‌ industrial cybersecurity risk assessment‌ as specified in the‌​‌ IEC 62443-3-2 standard, which​​ is widely used in​​​‌ the industrial cybersecurity domain.‌ By automating parts of‌​‌ these risk assessment processes,​​ we can reduce the​​​‌ error-prone manual efforts and‌ increase the consistency of‌​‌ risk assessment. More specifically,​​ the proposed risk assessment​​​‌ comprises three parts which,‌ respectively:

  • identify the specific‌​‌ vulnerabilities of industrial control​​ systems,
  • determine the attack​​​‌ scenarios that compromise the‌ safety of the system‌​‌
  • assess whether the attack​​ scenarios are tolerable by​​​‌ the organization's policy.

In‌ the first part, we‌​‌ automated the entire threat​​ modeling process of file​​​‌ called PLCOpen. This automation‌ of the Microsoft Threat‌​‌ Modeling Tool process Threat​​ Modeling Tool by developing​​​‌ an automatable method for‌ building the system model,‌​‌ in the form of​​ a data flow diagram,​​​‌ from a standard XML‌ file called PLCOpen. This‌​‌ automation of the Microsoft​​ Threat Modeling Tool process​​​‌ enables us to automate‌ vulnerability identification for industrial‌​‌ control systems.

In the​​​‌ second part, we enhance​ a previous work that​‌ generates theoretical safety-compromising attack​​ scenarios by building a​​​‌ complete attack scenario from​ system vulnerabilities to safety​‌ compromise.

Finally, in the​​ third part, we rank​​​‌ the attack scenarios using​ a specific risk matrix​‌ in order to determine​​ which scenarios exceed the​​​‌ risk tolerable by the​ organization and therefore require​‌ additional controls.

The results​​ were published in 16​​​‌

8.3.2 Host-based Intrusion Detection​ for Industrial Control Systems​‌

Participants: Omayma Alla,​​ Stephane Mocanu.

Traditionally,​​​‌ intrusion detection in Industrial​ control systems is performed​‌ at network level due​​ to the fact that​​​‌ the embedded OS of​ the Programmable Logic Controllers​‌ (PLCs) is accessible only​​ to the manufacturers.

We​​​‌ start evaluating the posibility​ to effectively incorporating lightweight​‌ Host-Based Intrusion Detection Systems​​ (HIDS) into PLCs. This​​​‌ technique provides a more​ comprehensive and rapid degree​‌ of security through monitoring​​ device activity in real​​​‌ time. The methodology uses​ formal specification methods to​‌ generate attributes from industrial​​ control logic (in particular​​​‌ written in SFC language)​ and regulations that can​‌ be verified at runtime.​​

The overall idea was​​​‌ published in 20.​ A first IDS was​‌ implemented as a PLC​​ separate task and a​​​‌ proof of concept was​ implemented on the G-ICS​‌ testbed. The result was​​ accepted for publication in​​​‌ January 2026 at the​ ICIT26 conference.

8.3.3 An​‌ Explainable Approach to Process-Oriented​​ Attacks in Industrial Control​​​‌ Systems using SHAP and​ LIME

Participants: Lea Astrid​‌ Kenmogne Mekemte, Stephane​​ Mocanu.

Process oriented​​​‌ attacks are attacks that​ target specifically the controlled​‌ physical process in an​​ industrial control system. Typically​​​‌ they are “stealth” attacks​ in the sense that​‌ they do not violate​​ the syntax or the​​​‌ semantics of communication protocols.​ They are sending legal​‌ frames (controls to actuators)​​ but in an inapropriate​​​‌ context. In previous approaches​ (42, 38​‌) we use runtime-monitoring​​ of security specification patterns​​​‌ extracted either from devices​ documentation and standards or​‌ mining of normal execution​​ traces. The problem of​​​‌ these approaches is that,​ in general, the full​‌ set of security patterns​​ cannot be obtained. Specification​​​‌ mining will produce a​ lot of false positive​‌ or inconsitent patterns while​​ extraction from device documentation​​​‌ and standars is manual​ and limited. On the​‌ other hand control programs​​ specifications are rarely available​​​‌ and reverse engineering of​ the specifications from PLC​‌ programs is very costly​​ and cannot be automatized.​​​‌

We propose an approach​ to detect process oriented​‌ attacks in industrial control​​ systems based on explainable​​​‌ artificial intelligence (XAI) using​ LIME and SHAP methods​‌ to understand the model’s​​ predictions. The experimental evaluation,​​​‌ conducted on a simulated​ industrial process, demonstrates that​‌ our approach provides good​​ detection accuracy and a​​​‌ comprehensive explanation of attacks​ being able to rebuild​‌ a large number of​​ security pattern from the​​​‌ explaination of the alerts.​

The methodology and experimental​‌ validation were presented in​​ 24.

8.3.4 Reconfiguration​​​‌ of Firewall Filter Rules​ as a Response to​‌ Industrial Control System Intrusion​​

Participants: Jolahn Vaudey,​​ Stephane Mocanu, Gwenaël​​​‌ Delaval, Stephane Mocanu‌.

As the IEC‌​‌ 62443 becomes the “de​​ facto” information security standard​​​‌ in industrial control systems‌ a need of supporting‌​‌ tools and methodologies for​​ the implementation of the​​​‌ standard requirements has arised.‌

This result adresses the‌​‌ network segmentation (called “Restricted​​ Data flow”) requirements of​​​‌ the standard in particular‌ reacting to the attack.‌​‌ Starting with a formal​​ description of the IEC​​​‌ 62443 compliant ICS under‌ study, we automate the‌​‌ creation of all necessary​​ filter rules, and the​​​‌ adaptation to application migration‌ and compromised device isolation.‌​‌ This approach is tested​​ on a small scale​​​‌ installation supervising a physical‌ process with industrial hardware.‌​‌

The methodology and experimental​​ validation were presented in​​​‌ 25.

8.3.5 Self-Reconfiguration‌ of Industrial Control Systems‌​‌ as a Response to​​ Cyberattacks

Participants: Jolahn Vaudey​​​‌, Stephane Mocanu,‌ Gwenaël Delaval, Eric‌​‌ Rutten.

In the​​ same vein of system​​​‌ reconfiguration in case of‌ an attack as the‌​‌ previous result, we propose​​ a system that, upon​​​‌ detection of a compromised‌ component, dynamically reconfigures itself‌​‌ to maintain functionality. Our​​ approach leverages the increasing​​​‌ virtualization of ICS to‌ migrate tasks from compromised‌​‌ devices to healthy ones,​​ ensuring continued operation while​​​‌ containing the attack. We‌ model the reconfiguration problem‌​‌ using the IEC 62443​​ standard, representing ICS as​​​‌ a network of zones‌ linked by conduits. We‌​‌ present a system model​​ incorporating security levels, device​​​‌ capacities, application dependencies, and‌ communication constraints. Then, we‌​‌ formulate the task migration​​ as an optimization problem​​​‌ solved via constraint programming.‌ We detail several variations‌​‌ of the base reconfiguration​​ program, including the activation​​​‌ of countermeasures or conduits,‌ and the preemptive allocations‌​‌ of applications instances to​​ host devices with memory​​​‌ size constraints. Our approach‌ is evaluated through a‌​‌ combination of a physical​​ training factory use case​​​‌ and generated problem instances‌ with arbitrary sizes. This‌​‌ evaluation concerns the execution​​ time of the reconfiguration​​​‌ process, as well as‌ the resilience, measured in‌​‌ number of devices attacked​​ before a critical application​​​‌ must be stopped.

The‌ methodology and experimental validation‌​‌ were presented in 18​​. The instrumentation scripts​​​‌ are public 35.‌

9 Bilateral contracts and‌​‌ grants with industry

9.1​​ Bilateral grants with industry​​​‌

Qarnot computing

Participants: Raphaël‌ Bleuse, Kouds Halitim‌​‌, Bogdan Robu,​​ Eric Rutten.

We​​​‌ have a cooperation with‌ Qarnot computing in the‌​‌ framework of the Inria​​ challenge PULSE (website​​​‌), with the support‌ of Ademe, on the‌​‌ topic of pushing carbon-neutral​​ services towards the edge.​​​‌ Particularly, we are involved‌ in WP5 on the‌​‌ Control of emissions of​​ intensive computation tasks, and​​​‌ WP6, which we are‌ coordinating, on the efficient‌​‌ hybridation of heterogeneous computing​​ tasks.

RTE

Participants: Stéphane​​​‌ Mocanu, Clément Mommessin‌, Eric Rutten,‌​‌ Jolahn Vaudey.

We​​ have a cooperation with​​​‌ RTE (the French Energy‌ Transportion company) : Guillaume‌​‌ Giraud, following our recent​​ work in the H2020​​​‌ CPS4EU project. It is‌ continuing in the new‌​‌ project Tasting (Section 10.2.3​​​‌) of the PEPR​ TASE.

10 Partnerships and​‌ cooperations

10.1 European initiatives​​

10.1.1 Seanergys

Participants: Raphaël​​​‌ Bleuse.

Since Septembre​ 2025, we are involved​‌ in the Searnegys project​​ (website). Our​​​‌ involvment in this project​ is mainly in the​‌ work package 4, focusing​​ on dynamic resource management.​​​‌ We develop simulation tooling​ for HPC platforms. This​‌ participation in the project​​ strenghthen the existing collaboration​​​‌ with the Datamove team.​

10.2 National initiatives

10.2.1​‌ PEPR Cybersecurity, project SuperviZ​​

Participants: Omayma Alla,​​​‌ Gwenaël Delaval, Léa​ Kenmogne, Elian Loraux​‌, Stéphane Mocanu,​​ Eric Rutten, Jolahn​​​‌ Vaudey.

We participate​ in the PEPR Cybersecurity​‌ research project SuperviZ in​​ three workpackages.

The SuperviZ​​​‌ project is granting four​ Phd's ins the areas​‌ of dectection and reaction​​ to attacks (Figure 7​​​‌).

Figure 7

The image presents​ the NIST Cybersecurity Framework,​‌ depicted as a circular​​ diagram divided into five​​​‌ segments: Identify, Protect, Detect,​ Respond, and Recover, all​‌ governed centrally. Four PhD​​ research topics related to​​​‌ cybersecurity are linked to​ different parts of the​‌ framework. PhD Elian Loraux​​ (2028) focuses on OT​​​‌ Honeypot and Naval Group​ collaboration, linked to Respond.​‌ PhD Jolahn Vaudey (2025)​​ on OT/IT reconfiguration and​​​‌ IEC 62443 DSL, linked​ to Respond. PhD Omayma​‌ Alla (2027) on Host​​ IDS for PLC, linked​​​‌ to Detect. PhD Léa​ Kenmogne (2026) on Explainable​‌ AI for intrusion detection​​ in ICS, linked to​​​‌ Detect.

Figure 7:​ CTRL-A participation positionning in​‌ SuperviZ

Stéphane Mocanu is​​ the leader of the​​​‌ Platforms workpackage of SuperviZ.​ An mid-term advancement report​‌ of the project is​​ available 36.

10.2.2​​​‌ PEPR Cloud, project Taranis​

Participants: Raphaël Bleuse,​‌ Robin Chaussemy, Nathan​​ Rabier, Eric Rutten​​​‌.

In the framework​ of the PEPR Cloud,​‌ Ctrl-A is participating in​​ the project Taranis (Model,​​​‌ Deploy, Orchestrate, and Optimize​ Cloud Applications and Infrastructure).​‌ We mainly work within​​ WP 3 Orchestration of​​​‌ services and ressources.

The​ project is funding two​‌ PhDs working on autconomic​​ managers. The focus is​​​‌ on the integration –​ as model and decision​‌ tools – of control​​ and constraints, control and​​​‌ scheduling. The integration of​ temporal aspects in reconfiguration​‌ management will also be​​ studied.

This work is​​​‌ done in cooperation with​ the Spirals team at​‌ Inria Lille and the​​ Stack team in Nantes.​​​‌

10.2.3 PEPR TASE, project​ Tasting

Participants: Stéphane Mocanu​‌, Clément Mommessin,​​ Eric Rutten.

In​​​‌ the framework of the​ PEPR TASE (Technologies Avancées​‌ des Systèmes Énergétiques), Ctrl-A​​ is participating in the​​​‌ project Tasting (TrAnsformation of​ the energy SysTem for​‌ a better resilience and​​ flexibility with enhanced digitalization),​​​‌ particularly in :

  • WP1​ : Infrastructure reliability and​‌ security with a post-doc​​ position on : specification​​​‌ of the distributed architecture​ and reconfiguration strategy for​‌ the communication and control​​ infrastructure
  • WP2 : Distributed​​​‌ architectures of cyber-physical systems​ with a post-doc position​‌ on : methods for​​ attacks detection by events​​​‌ correlation between network traffic​ observations and logs from​‌ control equipment. This postdoc​​ is already ongoing and​​ we start developping implementation​​​‌ tools for attacks on‌ real-time protocols (SMV, GOOSE‌​‌ and PTP). The experimental​​ validation is performed on​​​‌ G-ICS lab on a‌ substation protection workbench. The‌​‌ electrical network is simulated​​ by the G-ICS HIL​​​‌ system.
    Figure 8

    The image shows‌ a mobile technical setup‌​‌ with three open cabinets.​​ Each cabinet contains electronic​​​‌ equipment, an Intelligent Electronic‌ Device (protection relay) and‌​‌ Stand-Alone Measurement Unit (SAMU)​​ upper sections and the​​​‌ sets of electronic boards‌ used to simulate the‌​‌ electrical network on the​​ lower sections.

    Figure 8​​​‌: Substation workbench
  • WP3‌ : Ease deployment on‌​‌ hardware with post-doc positions​​ on :
    • model-based control​​​‌ (constraints solving) of self-adaptive‌ deployment of distributed applications‌​‌ on the Cloud-Edge infrastructures​​
    • reactive infrastructures for rapid​​​‌ protection in case of‌ process perturbation

10.2.4 AMI‌​‌ CMA CyberSkill@Alpes

Participants: Stéphane​​ Mocanu.

We participate​​​‌ in the AMI CMA‌ Cyberskill@Alpes cybersecurity education and‌​‌ research project.

Stéphane Mocanu​​ is involved into the​​​‌ AMI CMA Cyberskill together‌ with a small team‌​‌ of technical staff not​​ affiliated with CTRL-A. He​​​‌ is in charge of‌ four deliverables:

  1. A demonstrator‌​‌ of IEC 62443 security​​ approach deployment (zone/conduit definition​​​‌ and implementation). The demonstrator‌ consists of five interconnected‌​‌ Fischertechnik Training Factory Industry​​ 4.0 models twenty PLC​​​‌ and five industrial firewalls‌ and a local network‌​‌ intended to show the​​ security levels calculation, deployment​​​‌ of network flow cartography‌ and network segmentation. The‌​‌ mechanical and electrical parts​​ of the demonstrator are​​​‌ ready, we are starting‌ the software development. A‌​‌ security supervision module will​​ be added in the​​​‌ future.
  2. A low-cost workbench‌ for cybersecurity awareness. Based‌​‌ on a simulated physical​​ process, a low-cost PLC​​​‌ and HMI and license‌ free software the workbench‌​‌ is intended to be​​ used by high-school and​​​‌ secondary school teachers. We‌ have designed the plans‌​‌ and acquired the hardware;​​ the physical process simulation​​​‌ will be developed by‌ computer science students in‌​‌ 2026 and the electrical​​ and mechanical part of​​​‌ the workbench shall be‌ achieved by the end‌​‌ of 2026
    Figure 9

    The image​​ shows four FischerTechnik Factory​​​‌ Industry 4.0 simulators fully‌ instrumented with PLS's industrial‌​‌ switches and firewals.

    Figure​​ 9: IEC 62443​​​‌ demonstrator
  3. A set of‌ serious games for industrial‌​‌ systems security awareness and​​ training. We intend to​​​‌ develop a board game‌ with several complexity levels‌​‌ combining strategy, collaboration, resource​​ management, hazard and cheating​​​‌ in a red team‌ / blue team setup.‌​‌ A professional in game​​ development was contacted and​​​‌ we hope to start‌ the developments during 2026.‌​‌
  4. An industrial systems security​​ module including masterclasses and​​​‌ labs. Intended initially for‌ the local cybersecurity master‌​‌ students the project has​​ evolved to a training​​​‌ module that well be‌ distributed by the PTCC‌​‌ (Programme de Transfert au​​ Campus Cyber). A PTCC​​​‌ Formation grant was obtained‌ in November 2025 and‌​‌ the developments are expected​​ to start in January​​​‌ 2026. The labs will‌ be developed on the‌​‌ Airbus CyberRange.

10.2.5 ANR​​ RADYAL

Participants: Bogdan Robu​​​‌, Eric Rutten.‌

Ctrl-A participates in the‌​‌ ANR project (in the​​​‌ ANR call : AI​ computing hardware architectures and​‌ accelerators in the context​​ of Edge Computing) called​​​‌ Radyal Resource-Aware DYnamically Adaptable​ machine Learning, in cooperation​‌ with INSA Lyon /​​ LIRIS (Stefan Duffner), the​​​‌ TARAN team, Inria /​ Irisa, Rennes (Marcello Traiola),​‌ and the MODUS team,​​ UGA / GIPSA-lab, Grenoble​​​‌ (Bogdan Robu).

We will​ work on the analysis​‌ of self-adaptationreconfiguration spaces in​​ the dimensions of Application​​​‌ (DNN algorithms), environment (applicative​ aspects e.g., lighting, obstruction​‌ in image analysis), and​​ infrastructure and implementation configuration​​​‌ and deployment (involving hardware​ with reconfigurable precision and​‌ mapping). A post-doctoral fellow​​ has started at GIPSA-lab​​​‌ on this project.

11​ Dissemination

11.1 Promoting scientific​‌ activities

11.1.1 Scientific events:​​ organisation

Member of the​​​‌ organizing committees

Stephane Mocanu​ is participating in the​‌ steering committee of RESSI​​ (Rendez-Vous de la Recherche​​​‌ et de l'Enseignement de​ la Sécurité des Systèmes​‌ d'Information).

Eric Rutten is​​ participating in the steering​​​‌ committee of FETCH (École​ d'hiver Francophone sur les​‌ Technologies de Conception des​​ Systèmes Embarqués Hétérogènes) the​​​‌ Winter School on Heterogeneous​ Embedded Systems Design Technologies,​‌ for the 2023, 2024​​ and 2025 editions (Fetch​​​‌ web site).

11.1.2 Scientific​ events: selection

Chair of​‌ conference program committees

Eric​​ Rutten was keynote session​​​‌ chair at IC2E25.

Member​ of the conference program​‌ committees

Raphaël Bleuse was​​ member of the program​​​‌ committees of the PECS​ workshop at Euro-Par 2025​‌ and the Symposium on​​ Applied Computing (SAC) 2026.​​​‌

Stéphane Mocanu was member​ of the program commitees​‌ of Netsoft workshop Secsoft​​ 2025 and ESORICS workshop​​​‌ Anubis 2025.

11.1.3 Journal​

Member of the editorial​‌ boards

Eric Rutten and​​ Sophie Cerf were special​​​‌ issue co-editors for ACM​ TAAS (ACM Transactions on​‌ Autonomous and Adaptive Systems​​ Special Issue on Control​​​‌ for Computing Systems).

Reviewer​ - reviewing activities

Raphaël​‌ Bleuse reviewed for the​​ IEEE Transactions on Parallel​​​‌ and Distributed Systems (TPDS)​ journal.

Stephane Mocanu was​‌ reviewing for ACM computing​​ surveys, Computers & Security,​​​‌ Electrical Engineering and Journal​ of Network and Systems​‌ Management.

11.1.4 Invited talks​​

Stéphane Mocanu was invited​​​‌ to a keynote on​ the cybersecurity of electrical​‌ grids at the SATES​​ conference in 2025 in​​​‌ Nancy 19.

Clément​ Mommessin was invited for​‌ a seminar at the​​ IRIT laboratory in Toulouse,​​​‌ in July 2025.

11.1.5​ Scientific expertise

Stephane Mocanu​‌ is member of the​​ Scientific and Technical Comitee​​​‌ of the SEE society​ and also of the​‌ Technical Commitee of the​​ PTCC (Programme de Transfert​​​‌ au Campus Cyber).

11.1.6​ Research administration

Raphaël Bleuse​‌ is member of the​​ team organizing the LIG​​​‌ keynotes.

Gwenaël Delaval is​ elected member at the​‌ Academic Council (Conseil Académique)​​ of University Grenoble Alpes​​​‌ (UGA) for the Confédération​ Générale du Travail trade​‌ union.

11.2 Teaching -​​ Supervision - Juries -​​​‌ Educational and pedagogical outreach​

11.2.1 Teaching

  • Master :​‌ Omayma Alla , Computer​​ Networks and Cybersecurity, 28h​​​‌ lab, M1, Grenoble-INP/ENSE3
  • Licence:​ Raphaël Bleuse , Communication​‌ bas niveau, 4h tutorials,​​ 6h practicals, L1, Univ.​​​‌ Grenoble Alpes/IUT2
  • Licence: Raphaël​ Bleuse , Introduction aux​‌ services réseaux, 8h tutorials,​​ 8h practicals, L1, Univ.​​ Grenoble Alpes/IUT2
  • Licence: Raphaël​​​‌ Bleuse , Installation de‌ services réseau, 8h practicals,‌​‌ L1, Univ. Grenoble Alpes/IUT2​​
  • Lifelong-learning: Raphaël Bleuse ,​​​‌ Fondamentaux en informatique, 22h‌ lectures, 8h practicals, Univ.‌​‌ Grenoble Alpes/IUT2
  • Licence :​​ Gwenaël Delaval , Bases​​​‌ du développement logiciel, modularité‌ et tests, 15h lecture/tutorials,‌​‌ 15h lab, L2, Univ.​​ Grenoble Alpes
  • Master :​​​‌ Gwenaël Delaval , Sémantique‌ des Langages de Programmation‌​‌ et Compilation, 30h tutorials,​​ M1, Univ. Grenoble Alpes​​​‌
  • Master : Gwenaël Delaval‌ , Compilation project, 4‌​‌ weeks software project tutoring,​​ M1, Univ. Grenoble Alpes​​​‌
  • Master : Lea Astrid‌ Kenmogne Mekemte , Computer‌​‌ Networks and Cybersecurity, 28h​​ lab, M1, Grenoble-INP/ENSE3
  • Master​​​‌ : Lea Astrid Kenmogne‌ Mekemte , Computer Networks‌​‌ and Automation, 10h class,​​ 28h lab, M1, Grenoble-INP/ENSE3​​​‌
  • Master: Elian Loraux ,‌ sécurité de l'information: Red‌​‌ team Blue team DNS,​​ 15h practicals, M2, Grenoble-INP/Ensimag​​​‌
  • Master : Stephane Mocanu‌ , Computer Networks and‌​‌ Cybersecurity, 16h class, 34h​​ lab, M1, Grenoble-INP/ENSE3
  • Master​​​‌ : Stephane Mocanu ,‌ Industrial Computer Networks, 8h‌​‌ class, 8h lab, M2,​​ Grenoble-INP/ENSE3
  • Master : Stephane​​​‌ Mocanu , Reliability, 10h‌ class, 8h lab, M2,‌​‌ Grenoble-INP/ENSE3
  • Lifelong-learning : Stephane​​ Mocanu , Industrial Control​​​‌ Sytels Cybersecurity, Inria Academy,‌ One day State-of-the-Art Training.‌​‌
  • Licence: Clement Mommessin ,​​ Automatisation de la chaine​​​‌ de production, 6h lectures,‌ 14h practicals, L3, Univ.‌​‌ Grenoble Alpes/IUT2
  • Licence: Clement​​ Mommessin , Virtualisation avancée​​​‌ 4h lectures, 12h practicals,‌ L3, Univ. Grenoble Alpes/IUT2‌​‌

11.2.2 Supervision

  • PhD: Jolahn​​ Vaudey (UGA), Self-reconfiguration of​​​‌ industrial systems applied to‌ cyberresilience ; started October‌​‌ 2022, defended October 2025;​​ co-advised by Stéphane Mocanu,​​​‌ Gwenaël Delaval, Eric Rutten.‌
  • PhD in progress: Kouds‌​‌ Halitim (Inria), Efficicient task​​ hybridization in heterogeneous computing:​​​‌ practical combinations of Control‌ and Scheduling theories ;‌​‌ started November 2023 ;​​ co-advised by Raphaël Bleuse,​​​‌ Éric Rutten, Bogdan Robu.‌
  • PhD in progress: Lea‌​‌ Astrid Kenmogne Mekemte (UGA),​​ Explainable AI for Network​​​‌ Intrusion Detection in Industrial‌ Control Systems ; started‌​‌ November 2023 ; advised​​ by Stéphane Mocanu.
  • PhD​​​‌ in progress: Omayma Alla‌ (UGA), Host Intrusion Detection‌​‌ Systems for PLC ;​​ started January 2025 ;​​​‌ advised by Stéphane Mocanu.‌
  • PhD in progress: Elian‌​‌ Loraux (UGA), Interactive honeypot​​ fior industrial control systems​​​‌ ; started October 2025‌ ; co-advised by Stéphane‌​‌ Mocanu, Julien Francq (Naval​​ Group) and Jean Leneutre​​​‌ (Telecom Paris).
  • PhD in‌ progress: Robin Chaussemy (Inria),‌​‌ Modelization of HPC Jobs​​ and Resources to Minimize​​​‌ Energy Waste; started October‌ 2025 ; co-advised by‌​‌ Raphaël Bleuse , Franck​​ Corset (LJK) and Éric​​​‌ Rutten .
  • PhD in‌ progress: Nathan Rabier (Inria),‌​‌ Handling dynamic constaints and​​ deadlines in distributed software​​​‌ reconfiguration ; started November‌ 2025 ; co-advised by‌​‌ Sophie Cerf , Hélène​​ Coullon (IMT Atlantique) and​​​‌ Eric Rutten .

11.2.3‌ Juries

Stephane Mocanu was‌​‌ reviewer and member of​​ the PhD dissertation committees​​​‌ of Ahmed ELMARKEZ, U.‌ Bretagne Sud and Nourhan‌​‌ HALAWI GHOSON, ENSAM, Nov.​​ 2025 and also Enzo​​​‌ D'ANDREA, U. Lorraine, in‌ Dec. 2025 and member‌​‌ of the CSI comitees​​ of Arthur TRAN VAN,​​​‌ Telecom Paris and Florent‌ DURECU (U. Clermont-Ferrand).

Eric‌​‌ Rutten was reviewer and​​​‌ member of the HdR​ jury of Hèlene Coulon​‌ (Univ. Nantes).

12 Scientific​​ production

12.1 Major publications​​​‌

  • 1 articleF.Frederico​ Alvares, E.Eric​‌ Rutten and L.Lionel​​ Seinturier. A Domain-specific​​​‌ Language for The Control​ of Self-adaptive Component-based Architecture​‌.Journal of Systems​​ and SoftwareJanuary 2017​​​‌HAL
  • 2 articleX.​Xin An, E.​‌Eric Rutten, J.-P.​​Jean-Philippe Diguet and A.​​​‌Abdoulaye Gamatié. Model-based​ design of correct controllers​‌ for dynamically reconfigurable architectures​​.ACM Transactions on​​​‌ Embedded Computing Systems (TECS)​153February 2016​‌HAL
  • 3 articleN.​​Nicolas Berthier, E.​​​‌Eric Rutten, N.​Noël De Palma and​‌ S.-K. M.Soguy Mak-Karé​​ Gueye. Designing Autonomic​​​‌ Management Systems by using​ Reactive Control Techniques.​‌IEEE Transactions on Software​​ Engineering427July​​​‌ 2016, 18HAL​back to text
  • 4​‌ inproceedingsS.Sophie Cerf​​, R.Raphaël Bleuse​​​‌, V.Valentin Reis​, S.Swann Perarnau​‌ and E.Eric Rutten​​. Sustaining Performance While​​​‌ Reducing Energy Consumption: A​ Control Theory Approach.​‌Lecture Notes in Computer​​ ScienceEURO-PAR 2021 -​​​‌ 27th International European Conference​ on Parallel and Distributed​‌ Computing12820Euro-ParLisbon,​​ PortugalSpringerSeptember 2021​​​‌, 334–349HALDOI​
  • 5 inproceedingsS.Sophie​‌ Cerf and E.Eric​​ Rutten. Combining neural​​​‌ networks and control: potentialities,​ patterns and perspectives.​‌Proceedings of The 22nd​​ World Congress of the​​​‌ International Federation of Automatic​ ControlIFAC 2023 -​‌ 22nd World Congress of​​ the International Federation of​​​‌ Automatic ControlYokohama, Japan​July 2023HAL
  • 6​‌ inproceedingsG.Gwenaël Delaval​​, A.Ayan Hore​​​‌, S.Stéphane Mocanu​, L.Lucie Muller​‌ and E.Eric Rutten​​. Discrete Control of​​​‌ Response for Cybersecurity in​ Industrial Control.IFAC​‌ 2020 - IFAC World​​ Congress 2020Proc. of​​​‌ the 21st IFAC World​ CongressBerlin, GermanyJuly​‌ 2020, 1-8HAL​​
  • 7 articleG.Gwenaël​​​‌ Delaval, E.Eric​ Rutten and H.Hervé​‌ Marchand. Integrating Discrete​​ Controller Synthesis in a​​​‌ Reactive Programming Language Compiler​.journal of Discrete​‌ Event Dynamic System, jDEDS,​​ special issue on Modeling​​​‌ of Reactive Systems23​42013, 385-418​‌URL: http://dx.doi.org/10.1007/s10626-013-0163-5
  • 8 inproceedings​​G.Gwenaël Delaval and​​​‌ E.Eric Rutten.​ Reactive model-based control of​‌ reconfiguration in the Fractal​​ component-based model.Proceedings​​​‌ of the 13th International​ Symposium on Component Based​‌ Software Engineering (CBSE), \em​​ Prague, Czech Republic, 23-25​​​‌ June\bf best paper​ award2010, 93--112​‌URL: http://dx.doi.org/10.1007/978-3-642-13238-4_6
  • 9 inproceedings​​S.-K. M.Soguy Mak-Karé​​​‌ Gueye, G.Gwenaël​ Delaval, E.Eric​‌ Rutten, D.Dominique​​ Heller and J.-P.Jean-Philippe​​​‌ Diguet. A Domain-specific​ Language for Autonomic Managers​‌ in FPGA Reconfigurable Architectures​​.ICAC 2018 -​​​‌ 15th IEEE International Conference​ on Autonomic ComputingTrento,​‌ ItalyIEEESeptember 2018​​, 1-10HALback​​​‌ to text
  • 10 inproceedings​O.Oualid Koucham,​‌ S.Stéphane Mocanu,​​ G.Guillaume Hiet,​​​‌ J.-M.Jean-Marc Thiriet and​ F.Frédéric Majorczyk.​‌ Efficient Mining of Temporal​​ Safety Properties for Intrusion​​ Detection in Industrial Control​​​‌ Systems.SAFEPROCESS 2018‌ - 10th IFAC Symposium‌​‌ on Fault Detection, Supervision​​ and Safety for Technical​​​‌ ProcessesVarsovie, PolandAugust‌ 2018, 1-8HAL‌​‌
  • 11 incollection M.Marin​​ Litoiu, M.Mary​​​‌ Shaw, G.Gabriel‌ Tamura, N. M.‌​‌Norha M. Villegas,​​ H.Hausi Müller,​​​‌ H.Holger Giese,‌ R.Romain Rouvoy and‌​‌ E.Eric Rutten.​​ What Can Control Theory​​​‌ Teach Us About Assurances‌ in Self-Adaptive Software Systems?‌​‌ Software Engineering for Self-Adaptive​​ Systems 3: Assurances 9640​​​‌ LNCS Springer May 2017‌ HAL back to text‌​‌
  • 12 inproceedingsM.Maxime​​ Louvel, F.François​​​‌ Pacull, E.Eric‌ Rutten and A. N.‌​‌Adja Ndeye Sylla.​​ Development Tools for Rule-Based​​​‌ Coordination Programming in LINC‌.19th International Conference‌​‌ on Coordination Languages and​​ Models (COORDINATION)LNCS-10319Coordination​​​‌ Models and LanguagesPart‌ 2: Languages and Tools‌​‌Neuchâtel, SwitzerlandSpringer International​​ PublishingJune 2017,​​​‌ 78-96HALDOI
  • 13‌ inproceedingsM. T.Mahyar‌​‌ T Moghaddam, E.​​Eric Rutten, P.​​​‌Philippe Lalanda and G.‌Guillaume Giraud. IAS:‌​‌ an IoT Architectural Self-adaptation​​ Framework.ECSA 2020​​​‌ - 14th European Conference‌ on Software ArchitectureL’Aquila,‌​‌ ItalySeptember 2020,​​ 1-16HAL
  • 14 incollection​​​‌E.Eric Rutten,‌ N.Nicolas Marchand and‌​‌ D.Daniel Simon.​​ Feedback Control as MAPE-K​​​‌ loop in Autonomic Computing‌.Software Engineering for‌​‌ Self-Adaptive Systems III. Assurances.​​9640Lecture Notes in​​​‌ Computer ScienceSpringerJanuary‌ 2018, 349-373HAL‌​‌DOI
  • 15 articleN.​​Naweiluo Zhou, G.​​​‌Gwenaël Delaval, B.‌Bogdan Robu, E.‌​‌Eric Rutten and J.-F.​​Jean-François Méhaut. An​​​‌ Autonomic-Computing Approach on Mapping‌ Threads to Multi-cores for‌​‌ Software Transactional Memory.​​Concurrency and Computation: Practice​​​‌ and Experience3018‌September 2018, e4506‌​‌HALDOIback to​​ text

12.2 Publications of​​​‌ the year

International journals‌

Invited conferences

  • 19​​​‌ inproceedingsS.Stéphane Mocanu‌. Smart-Grids Cybersecurity: threats,‌​‌ vulnerabilities and security framework​​.SATES 2025 -​​​‌ Symposium on Advanced Technologies‌ in Electrical SystemsNancy,‌​‌ France2025HALback​​ to text

International peer-reviewed​​​‌ conferences

Conferences without proceedings

Doctoral​​​‌ dissertations and habilitation theses‌

  • 29 thesisJ.Jolahn‌​‌ Vaudey. Reconfiguration of​​ industrial systems as a​​​‌ reaction to cyberattacks.‌Université Grenoble AlpesOctober‌​‌ 2025HAL

Other scientific​​ publications

  • 30 thesisM.​​​‌Mahmoud Abdo. Harvesting‌ Wasted Resources in HPC‌​‌ Systems Using Model Predictive​​ Control.Grenoble Alpes​​​‌ UniversityJune 2025HAL‌back to text
  • 31‌​‌ thesisR.Robin Chaussemy​​. Modelisation and estimation​​​‌ of HPC jobs life‌ expectancy.Université Grenoble‌​‌ - AlpesSeptember 2025​​HALback to text​​​‌
  • 32 thesisA.Alexis‌ Detroyat. Flexibility in‌​‌ Data-Centers for Digital Soberness​​.Université grenoble alpes​​​‌June 2025HALback‌ to text
  • 33 inproceedings‌​‌K.Kouds Halitim.​​ Task hybridization in heterogeneous​​​‌ computing: a combination of‌ control and scheduling theories‌​‌.2025 - concours​​ de la journée «​​​‌ PhD Madness » du‌ LIGGRENOBLE (38000), France‌​‌May 2025HALback​​ to text
  • 34 thesis​​​‌M. A.Mohamed Abdeldjalil‌ Maziz. Power Capping‌​‌ Control Across Varying Workloads​​ in HPC.Grenoble​​​‌ UGA - Université Grenoble‌ AlpesJune 2025,‌​‌ 1-27HALback to​​ text

Software

12.3 Cited publications‌

  • 36 techreportH.Hervé‌​‌ Debar, L.Ludovic​​ , J.Jean​​​‌ Leneutre, V.Vincent‌ Nicomette, J.Jérôme‌​‌ François, C.Cédric​​ Gouy-Pailler, G.Gregory​​​‌ Blanc and S.Stéphane‌ Mocanu. SuperviZ supervision‌​‌ et orchestration de la​​ sécurité Rapport d'avancement à​​​‌ mi-projet.Télécom SudParis‌ (Institut Mines-Télécom) ; Inria‌​‌October 2025, 1-56​​HALback to text​​​‌
  • 37 bookJ.J.‌ Hellerstein, Y.Y.‌​‌ Diao, S.S.​​ Parekh and D.D.​​​‌ Tilbury. Feedback Control‌ of Computing Systems.‌​‌Wiley-IEEE2004back to​​ text
  • 38 articleE.​​​‌Estelle Hotellier, F.‌Franck Sicard, J.‌​‌Julien Francq and S.​​Stéphane Mocanu. Standard​​​‌ specification-based intrusion detection for‌ hierarchical industrial control systems‌​‌.Information Sciences659​​February 2024, 120102​​​‌HALDOIback to‌ textback to text‌​‌back to text
  • 39​​ inproceedingsM.Maëlle Kabir-Querrec​​​‌, S.Stéphane Mocanu‌, P.Pascal Bellemain‌​‌, J.-M.Jean-Marc Thiriet​​ and E.Eric Savary​​​‌. Corrupted GOOSE Detectors:‌ Anomaly Detection in Power‌​‌ Utility Real-Time Ethernet Communications​​.GreHack 2015Verimag​​​‌Grenoble, FranceNovember 2015‌HALback to text‌​‌
  • 40 articleJ. O.​​​‌J. O. Kephart and​ D. M.D. M.​‌ Chess. The Vision​​ of Autonomic Computing.​​​‌IEEE Computer361​January 2003, 41--50​‌back to text
  • 41​​ articleO.Oualid Koucham​​​‌, S.Stéphane Mocanu​, G.Guillaume Hiet​‌, J.-M.Jean-Marc Thiriet​​ and F.Frédéric Majorczyk​​​‌. Cross-domain Alert Correlation​ methodology for Industrial Control​‌ Systems.Computers and​​ Security118JulyApril​​​‌ 2022, 102723HAL​DOIback to text​‌back to text
  • 42​​ inproceedingsO.Oualid Koucham​​​‌, S.Stéphane Mocanu​, G.Guillaume Hiet​‌, J.-M.Jean-Marc Thiriet​​ and F.Frédéric Majorczyk​​​‌. Detecting Process-Aware Attacks​ in Sequential Control Systems​‌.NordSec 2016 -​​ 21st Nordic Conference on​​​‌ Secure IT SystemsOulu,​ FinlandNovember 2016,​‌ p.20-36HALDOIback​​ to textback to​​​‌ textback to text​back to text
  • 43​‌ inproceedingsO.Oualid Koucham​​, S.Stéphane Mocanu​​​‌, G.Guillaume Hiet​, J.-M.Jean-Marc Thiriet​‌ and F.Frédéric Majorczyk​​. Efficient Mining of​​​‌ Temporal Safety Properties for​ Intrusion Detection in Industrial​‌ Control Systems.SAFEPROCESS​​ 2018 - 10th IFAC​​​‌ Symposium on Fault Detection,​ Supervision and Safety for​‌ Technical ProcessesVarsovie, Poland​​August 2018, 1-8​​​‌HALback to text​
  • 44 inproceedingsS.Stéphane​‌ Mocanu and J.-M.Jean-Marc​​ Thiriet. Experimental study​​​‌ of performance and vulnerabilities​ of IEC 61850 process​‌ bus communications on HSR​​ networks.EuroS&PW 2020​​​‌ - IEEE European Symposium​ on Security and Privacy​‌ WorkshopsGênes, ItalyIEEE​​September 2020, 584-593​​​‌HALDOIback to​ text
  • 45 articleS.​‌Stéphane Mocanu and J.-M.​​Jean-Marc Thiriet. Real-Time​​​‌ Performance and Security of​ IEC 61850 Process Bus​‌ Communications.Journal of​​ Cyber Security and Mobility​​​‌102April 2021​, 1-42HALDOI​‌back to text
  • 46​​ articleP.P.J. Ramadge​​​‌ and W.W.M. Wonham​. On the Supervisory​‌ Control of Discrete Event​​ Systems.Proceedings of​​​‌ the IEEE771​January 1989back to​‌ text
  • 47 inproceedingsA.​​ N.Adja Ndeye Sylla​​​‌, M.Maxime Louvel​, E.Eric Rutten​‌ and G.Gwenaël Delaval​​. Design Framework for​​​‌ Reliable Multiple Autonomic Loops​ in Smart Environments.​‌2017 IEEE International Conference​​ on Cloud and Autonomic​​​‌ Computing (ICCAC) Tucson, AZ,​ United StatesSeptember 2017​‌HALback to text​​