
Activez les alertes d’offres d’emploi par e-mail !
Générez un CV personnalisé en quelques minutes
Décrochez un entretien et gagnez plus. En savoir plus
A prestigious research institution in France is offering a post-doctoral position focusing on the application of artificial intelligence for reverse engineering wireless protocols in IoT security. Candidates must possess strong skills in IT security, familiarity with learning algorithms, and proficiency in programming languages such as Python and C++. This is a full-time temporary position based in Toulouse with applications accepted until December 10, 2025.
Organisation/Company CNRS Department Laboratoire d'analyse et d'architecture des systèmes Research Field Engineering Computer science Mathematics Researcher Profile Recognised Researcher (R2) Country France Application Deadline 10 Dec 2025 - 23:59 (UTC) Type of Contract Temporary Job Status Full-time Hours Per Week 35 Offer Starting Date 1 Feb 2026 Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No
The Internet of Things industry is notorious for relegating the security of these objects to the background in favor of other criteria such as reducing energy consumption, product cost, or development cycle time. For this reason, there is growing interest among vulnerability researchers in these products: Numerous weaknesses have recently been identified in wireless protocols such as Bluetooth [8, 9, 10], Bluetooth Low Energy [11, 12], and Logitech Unifying [13]. To better protect themselves, manufacturers are relying on security through obscurity by using undocumented proprietary protocols. This lack of documentation significantly slows down the work of vulnerability researchers, who must painstakingly reverse engineer protocols, from the physical radio layer (modulation used, data rate, presence of frequency hopping, etc.) to the application layer (i.e., the protocol controller).
Recently, several studies have focused on reverse engineering the lower layers of wireless protocols. Examples include the Universal Radio Hacker tool [14], which allows manual analysis of common modulations from raw signals, and the work of Galtier et al. [5], which has made it possible to partially automate the reverse engineering of the radio physical layer, paving the way for new reverse engineering tools. This post‑doc focuses on the application of artificial intelligence to the automatic reverse engineering of protocol layers, with three objectives.
The first objective is to facilitate the identification of fields within a protocol based on examples of binary sequences. Work in this area has already been carried out [2, 3] but still requires significant manual effort on the part of the vulnerability researcher. Furthermore, this work, carried out in the context of Ethernet communication, assumes that the first physical layer has been correctly decoded. In the case of network communications, the physical layer itself requires the use of artificial intelligence, which can introduce noise into the data (for example, two disjoint frames could be considered part of the same frame). In addition, certain mechanisms related to the physical layer could be incorrectly inferred, such as “whitening” (which ensures that there are not too many consecutive bits of the same value). Finally, unlike TCP/IP‑based protocols, physical layers do not necessarily rely on byte alignment and may, for example, include 9‑bit headers (such as the header field of the proprietary Enhanced ShockBurst protocol [15]): it therefore becomes impossible to process data byte by byte, as processing can only be performed bit by bit. All these specific constraints make it necessary to design frame structure reverse engineering techniques that are robust to noise, while relying on as few assumptions as possible. Data mining approaches can serve as a basis for this work [6]. To facilitate the identification of frame structures, we will rely on a collection of documented protocol structures extracted from the Scapy software [4]: many fields (length field, checksum, etc.) are commonly used in these protocols. This will greatly speed up reverse engineering if the protocol being analyzed is a variant of a known protocol, while also providing a knowledge base representative of current technologies.
The second objective is to infer protocol automata, which relies on the achievement of the first objective. There are methods for learning finite‑state automata, but most require active learning, i.e., they assume the presence of a “teacher” (or oracle) that can indicate whether a given sequence is protocol‑valid or not, and can provide counterexamples to a candidate learned automaton. As this assumption is not reasonable in our context, we will therefore rely on recent work [1] based on learning network protocols from communication examples. This work, adapted to TCP/IP communications, will need to be transposed to the wireless context and its specific constraints.
The third objective, dependent on the success of the previous two, is to perform fuzzing on a protocol based on its reverse engineering. This fuzzing will be intelligent: it will take advantage of the inferred protocol automaton in order to achieve broad test coverage while limiting unnecessary trials. In particular, our goal is to reverse engineer and identify or find vulnerabilities within proprietary or partially documented protocols, such as ANT+ or ANT‑FS [16], Logitech Unifying [13, 15, 17], or various protocols used by IoT devices, such as wireless keyboards [18] or smart remote controls [19].
This work will take place in Toulouse, at the LAAS-CNRS laboratory, and will be based on the LAAS-CNRS platform dedicated to the study of connected object security. This platform, initially developed as part of the SuperviZ project, aims to enable advanced instrumentation of commercial connected objects and IoT development kits while allowing the collection of wireless traffic at different levels of the protocol layer, from raw radio frequency signals (in the form of I/Q samples) to structured network files (PCAP type): it will thus constitute a valuable resource for evaluating the approaches proposed in this work. Supervision will be provided by Pierre-François Gimenez, AI and cybersecurity researcher at Inria, and Romain Cayre, lecturer and researcher in offensive cybersecurity at LAAS-CNRS. The implementations resulting from this work will be open‑source and will be integrated into the WHAD wireless attack framework [7] in order to transfer these contributions to other vulnerability researchers, whether they are academics, public institutions, or private companies.