Activez les alertes d’offres d’emploi par e-mail !
Générez un CV personnalisé en quelques minutes
Décrochez un entretien et gagnez plus. En savoir plus
Une entreprise de recherche de haut niveau recherche un candidat ayant un doctorat ou un diplôme d'ingénieur en électronique ou systèmes embarqués, avec une expérience en architecture de machines et en méthodes formelles pour la validation des systèmes contre les attaques par injection de failles. Le candidat travaillera dans un environnement avant-gardiste, conçu pour innover et défendre la sécurité des systèmes embarqués.
Context : Fault injection allows an attacker to move the target processor out of its expected functioning bounds. A hardware perturbation, by means of a fault injection, aims at inducing logical changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is then leveraged in attacks for leaking secrets, escalating privileges, etc. Recent research has highlighted the need to consider the consequences of fault injection in the processor micro-architecture.
In this area, pre-silicon tools developed by our team [1,2] are able to : 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security, for a given attacker model, of a system embedding hardware / software countermeasures against fault injections. Gobally, these tools implement a methodology that have shown to be successful to find microarchitectural vulnerabilities and / or prove the robustness, for a given fault model, of various RISC-V based processors [3]. For instance, we apply this methodology to the OpenTitan secure element and formally prove the security of its processor’s HW countermeasure to single bit-flip injections [4].
Objectives : Within a national research project promoting the use of pre-silicon tools to validate countermeasures against fault-injection attacks, your main missions will be :
To carry out your mission, you will benefit from a first-class environment at CEA LIST with access to a large number of reference tools and a strong experience in design and analysis of secure systems, in particular against fault-injection attacks and applied formal methods for microarchitectural analyses.
References
3]S. Tollec et al. μArchiIFI : Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD : -
4]S. Tollec et al.. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Trans. Cryptogr. Hardw. Embed. Syst. : -
Geographic mobility :
National
Profile
You have a PhD or a Engineer’s degree in the field of electronics or embedded systems. You have experience in computer architecture and / or hardware synthesis and / or formal methods for hardware verification. You enjoy working in an applied research environment at the state of the art and proposing innovations and various application areas.
You have acquired the following technical skills :
Location : Saclay (near Paris) or Grenoble
Hardware/software cybersecurity of embedded systems • Palaiseau, Ile-de-France, FR