Activez les alertes d’offres d’emploi par e-mail !

Hardware / software cybersecurity of embedded systems

CEA LIST

Palaiseau

Sur place

EUR 45 000 - 60 000

Plein temps

Hier
Soyez parmi les premiers à postuler

Générez un CV personnalisé en quelques minutes

Décrochez un entretien et gagnez plus. En savoir plus

Repartez de zéro ou importez un CV existant

Résumé du poste

Une entreprise de recherche de haut niveau recherche un candidat ayant un doctorat ou un diplôme d'ingénieur en électronique ou systèmes embarqués, avec une expérience en architecture de machines et en méthodes formelles pour la validation des systèmes contre les attaques par injection de failles. Le candidat travaillera dans un environnement avant-gardiste, conçu pour innover et défendre la sécurité des systèmes embarqués.

Qualifications

  • Expérience en architecture des ordinateurs ou en vérification matérielle.
  • Capacité à travailler dans un environnement de recherche appliquée.
  • Bonne maîtrise de l'anglais écrit et parlé.

Responsabilités

  • Concevoir et étendre la méthodologie pré-silicon et les outils associés.
  • Participer à l'évaluation de la sécurité via des systèmes RISC-V.
  • Travailler en collaboration avec un écosystème riche en évaluations de sécurité.

Connaissances

Architecture des ordinateurs
Méthodes formelles
Langages de programmation
Cybersécurité
Langages de description de matériel
Compétences en communication
Autonomie
Travail en équipe

Formation

PhD ou diplôme d'ingénieur en électronique ou systèmes embarqués

Outils

Verilog
C
C++
ASM

Description du poste

Context : Fault injection allows an attacker to move the target processor out of its expected functioning bounds. A hardware perturbation, by means of a fault injection, aims at inducing logical changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is then leveraged in attacks for leaking secrets, escalating privileges, etc. Recent research has highlighted the need to consider the consequences of fault injection in the processor micro-architecture.

In this area, pre-silicon tools developed by our team [1,2] are able to : 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security, for a given attacker model, of a system embedding hardware / software countermeasures against fault injections. Gobally, these tools implement a methodology that have shown to be successful to find microarchitectural vulnerabilities and / or prove the robustness, for a given fault model, of various RISC-V based processors [3]. For instance, we apply this methodology to the OpenTitan secure element and formally prove the security of its processor’s HW countermeasure to single bit-flip injections [4].

Objectives : Within a national research project promoting the use of pre-silicon tools to validate countermeasures against fault-injection attacks, your main missions will be :

  • Design and extend our pre-silicon methodology and associated tools to support different secured processors. In particular, leverage the specificities of the countermeasures embedded by such secured processors to speedup analysis techniques, but also integrate in our methodology and tools post-synthesis netlist level analyses of hardware architectures.
  • Participate in the comparison between the use of pre-silicon tools and post-silicon security evaluations on different RISC-V based systems (flavors of CV32E40 processors) using different injection means (clock glitching and / or laser beams). You will take advantage of a rich national and european eco-system and expertise around security evaluations of embedded systems

To carry out your mission, you will benefit from a first-class environment at CEA LIST with access to a large number of reference tools and a strong experience in design and analysis of secure systems, in particular against fault-injection attacks and applied formal methods for microarchitectural analyses.

References

3]S. Tollec et al. μArchiIFI : Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD : -

4]S. Tollec et al.. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Trans. Cryptogr. Hardw. Embed. Syst. : -

Geographic mobility :

National

Profile

You have a PhD or a Engineer’s degree in the field of electronics or embedded systems. You have experience in computer architecture and / or hardware synthesis and / or formal methods for hardware verification. You enjoy working in an applied research environment at the state of the art and proposing innovations and various application areas.

You have acquired the following technical skills :

  • Knowledge in : computer architecture, programming languages, formal methods, cyber-security;
  • Hardware description languages (e.g., Verilog) programming languages (C, C++ and ASM), scripting;
  • Excellent written and spoken English;
  • Communication and writing skills;
  • Teamwork and autonomy.

Location : Saclay (near Paris) or Grenoble

Hardware/software cybersecurity of embedded systems • Palaiseau, Ile-de-France, FR

Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.