Activez les alertes d’offres d’emploi par e-mail !

Cybersecurity formal analysis of fault-injection attacks in hardware / software embedded systems

CEA

Saclay

Sur place

EUR 60 000 - 80 000

Plein temps

Il y a 30+ jours

Mulipliez les invitations à des entretiens

Créez un CV sur mesure et personnalisé en fonction du poste pour multiplier vos chances.

Résumé du poste

Une entreprise innovante recherche un chercheur postdoctoral motivé pour travailler sur des contrats de sécurité pour les modèles d'attaquants par injection de fautes. Ce rôle implique la définition et la mise en œuvre de contrats de sécurité, soutenant une approche multi-niveaux pour analyser les contre-mesures hybrides. Le candidat idéal aura un doctorat en informatique ou dans un domaine connexe, avec une expertise en attaques par injection de fautes et en vérification formelle. Rejoignez une équipe dynamique dans le cadre du projet TwinSec et contribuez à des méthodologies et outils de pointe pour la sécurité microarchitecturale.

Qualifications

  • PhD requis en informatique, systèmes embarqués ou domaines connexes.
  • Expertise en attaques par injection de fautes et sécurité microarchitecturale.

Responsabilités

  • Définir des contrats de sécurité pour les modèles d'attaquants par injection de fautes.
  • Explorer l'intégration des contrats de sécurité dans les outils d'analyse ISA.

Connaissances

Attaques par injection de fautes
Vérification formelle
Sécurité microarchitecturale
Compétences en programmation
Analyse binaire
Langages spécifiques au domaine

Formation

Doctorat en informatique
Doctorat en systèmes embarqués

Outils

Binsec
Outils d'analyse ISA

Description du poste

Fault-injection attacks exploit hardware perturbations to move a processor into unexpected states or execution paths, potentially exposing secrets or escalating privileges. Recent research has highlighted the need to consider the consequences of fault injection in the processor micro-architecture. In this area, we have developed pre-silicon methodologies and tools that have shown to be successful to find microarchitectural vulnerabilities and/or formally prove the robustness, for a given fault model, of various RISC-V based processors. We have also developed binary-level program analysis methods (BINSEC/ASE) able to efficiently take into account some predefined ISA-level fault injection models. Yet, a major and common challenge of all these approaches lies in the state space generated by the modeling of processor’s behavior executing a sequence of instructions and under a fault model.

Objective.

This position focuses on defining and implementing security contracts for fault-injection attacker models. The proposed security contracts should support a multi-level approach, enabling the design and analysis of hybrid countermeasures, while also bridging fault models derived from experimental characterizations to the software level. They will also be used to revisit our k-fault-resistant partitioning methodology to analyze multi-fault models within complex systems, such as applications processors, and to help our binary-level code analyzers to handle more generic classes of fault models.

Within the TwinSec research project, your main missions will be to:

  • Define a semantics for the use of contracts in the context of fault injection attacks. Potential implementations may involve a domain-specific language or annotations to describe, at the ISA-level, the effects of faults stemming from the microarchitectural level. The model must account for both spatial aspects (defining RTL/netlist-level signals to be targeted) and temporal aspects (identifying injection time intervals);
  • Explore how such security contracts can enhance microarchitectural-level analyses, in particular by integrating into fault models information from experimental characterizations of laser injections. In particular, as TwinSec proposes a more realistic attacker model to identify microarchitecture-specific vulnerabilities, microarchitectural analyses could leverage for instance post-layout information;
  • Investigate the use of security contracts to integrate microarchitectural descriptions into ISA-level analysis tools like Binsec. The expected outcome is the validation of a multi-level semantics for contracts adapted to the context of fault injection attacks, ultimately enabling the implementation of an end-to-end analysis tool.

We are seeking a motivated researcher with:

  • A PhD in computer science, embedded systems, or related fields.
  • Expertise in fault-injection attacks, formal verification, or microarchitecture security.
  • Strong programming skills and analytical thinking. Experience with RISC-V processors, ISA-level/binary analysis tools, or domain-specific languages is a plus.

In accordance with the commitments made by the CEA in favor of the integration of people with disabilities, this job is open to everyone.

The TwinSec project is also recruiting a PhD candidate to work on the topic of security contracts for fault-injection attacker models. The Post-doc researcher will participate in the co-supervision of this PhD project and contribute to the development of the methodologies and tools designed by the PhD student.

Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.