[ The Types Forum (announcements only),
http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]
The BINSEC team
(https://urldefense.com/v3/__https://binsec.github.io/__;!!IBzWLUs!CMjGi_C3VMplAl-GA7VN6dpwnuOZ_yM50eEvYtbVWyfoMzjZT5W4UVs-D_tugvcwHig_JyaX2NKdpg$
) opens two PhD and one postdoc positions to work with Michaël Marcozzi and
Sébastien Bardin on automatic detection and prevention advanced software
vunerabilities.
. Start: as soon as possible in 2022. Duration: 3 years (PhD), 2 years
(postdoc).
. Keywords: binary-level security, program analysis, formal methods, symbolic
execution, static analysis, fuzzing, speculation
https://urldefense.com/v3/__https://binsec.github.io/jobs/2021/12/03/phd-postdoc-offer.html__;!!IBzWLUs!CMjGi_C3VMplAl-GA7VN6dpwnuOZ_yM50eEvYtbVWyfoMzjZT5W4UVs-D_tugvcwHig_Jya5MmGAnw$
== ABOUT US
OUR TEAM - The BINary-level SECurity research group (BINSEC) is a dynamic team
of 9 junior and 4 senior researchers. The group has frequent publications in
top-tier security, formal methods and software engineering conferences. We work
in close collaboration with other French and international research teams,
industrial partners and national agencies. The team is part of Université
Paris-Saclay, the world’s 13th and European Union’s 1st university, according
to the Shanghai ARWU Ranking in 2021.
OUR WORK - The team has high-level expertise in several binary code analysis
approaches, namely symbolic execution, abstract interpretation and fuzzing. We
apply these techniques to improve software security at the binary level,
covering notably vulnerability detection, code (de)obfuscation and formal
verification. See our website at
https://urldefense.com/v3/__https://binsec.github.io/__;!!IBzWLUs!CMjGi_C3VMplAl-GA7VN6dpwnuOZ_yM50eEvYtbVWyfoMzjZT5W4UVs-D_tugvcwHig_JyaX2NKdpg$
for additional information.
== JOB OFFERS
* a Ph.D position (3 years) in complex software vulnerability detection through
greybox and hybrid fuzzing
* a Ph.D position (3 years) in formal verification of security properties
against micro-architectural attacks
* a postdoc position (2 years) in software vulnerability detection in IoT
systems through static analysis, fuzzing, symbolic execution and/or machine
learning
Under the supervision of our senior researchers, you will be expected to solve
research problems, implement your solutions into evaluated prototypes, publish
at top conferences and journals, mentor students and broadly participate in the
scientific life of the team. All positions comprises both theoretical work and
coding. You will be able to dedicate a small fraction of your time to teaching
if you want so. Our former team members have been able to secure stimulating
positions in academia or industry and we will support you in advancing your
career.
== APPLICATION
Candidates should send a CV, a cover letter, and other information (see the
link below) to [email protected] as soon as possible (and at
the latest by January 2022). Applications will be reviewed immediately as they
arrive (first come, first served). The positions are expected to start as soon
as possible in 2022 (upon completion of all administrative requirements).
https://urldefense.com/v3/__https://binsec.github.io/jobs/2021/12/03/phd-postdoc-offer.html__;!!IBzWLUs!CMjGi_C3VMplAl-GA7VN6dpwnuOZ_yM50eEvYtbVWyfoMzjZT5W4UVs-D_tugvcwHig_Jya5MmGAnw$