Activez les alertes d’offres d’emploi par e-mail !

Security Contract Semantics for Fault-Injection Attacks in Embedded Systems H / F

CEA

Paris

Sur place

EUR 40 000 - 80 000

Plein temps

Il y a 30+ jours

Mulipliez les invitations à des entretiens

Créez un CV sur mesure et personnalisé en fonction du poste pour multiplier vos chances.

Résumé du poste

Une entreprise innovante recherche un chercheur post-doctoral passionné pour travailler sur les contrats de sécurité dans le cadre des attaques par injection de fautes. Ce projet de recherche vise à établir des méthodologies qui relient les modèles de fautes expérimentales aux niveaux logiciels et matériels. En tant que membre d'une équipe multidisciplinaire, vous aurez l'opportunité de définir des sémantiques pour des contrats de sécurité, d'explorer leur intégration dans des outils d'analyse et de contribuer à des projets de doctorat. Si vous êtes motivé et avez une expertise en sécurité microarchitecturale, cette position est faite pour vous.

Qualifications

  • Chercheur motivé avec un doctorat en informatique ou systèmes embarqués.
  • Expertise en attaques par injection de fautes et vérification formelle.

Responsabilités

  • Définir une sémantique pour l'utilisation de contrats dans les attaques par injection de fautes.
  • Explorer comment ces contrats peuvent améliorer les analyses au niveau microarchitectural.

Connaissances

Analyse formelle
Sécurité microarchitecturale
Langages spécifiques au domaine
Pensée analytique
Compétences en programmation

Formation

Doctorat en informatique
Doctorat en systèmes embarqués

Outils

Outils d'analyse binaire (Binsec)
Processeurs RISC-V

Description du poste

Security Contract Semantics for Fault-Injection Attacks in Embedded Systems H/F
Domaine

Contrat: Post-doctorat

The national TwinSec research project aims to establish an end-to-end methodology to identify and cancel, at the design stage, microarchitecture-specific vulnerabilities. The TwinSec project, which frames this Post-doc research, brings together several French laboratories specializing in hardware and software security to model and analyze fault-injections' effects at physical, hardware (HW), Instruction Set Architecture (ISA), and software (SW) levels. It focuses on physical attacks, mainly on fault injection using lasers, and proposes a more realistic attacker model for a multi-level fault analysis. Existing modeling tools are not yet capable of efficiently predicting an embedded systems' resistance to such attacks due to generic fault models. To ensure scalable formal analyses within this end-to-end methodology, appropriate ways to exchange information between layers must be defined.

Research Context and Challenge

Fault-injection attacks exploit hardware perturbations to move a processor into unexpected states or execution paths, potentially exposing secrets or escalating privileges. Recent research has highlighted the need to consider the consequences of fault injection in the processor micro-architecture. In this area, we have developed pre-silicon methodologies and tools that have shown to be successful in finding microarchitectural vulnerabilities and/or formally proving the robustness, for a given fault model, of various RISC-V based processors. We have also developed binary-level program analysis methods (BINSEC/ASE) able to efficiently take into account some predefined ISA-level fault injection models. Yet, a major and common challenge of all these approaches lies in the state space generated by the modeling of the processor’s behavior executing a sequence of instructions and under a fault model.

Objective

This CDD or Post-doc position focuses on defining and implementing security contracts for fault-injection attacker models. The proposed security contracts should support a multi-level approach, enabling the design and analysis of hybrid countermeasures, while also bridging fault models derived from experimental characterizations to the software level. They will also be used to revisit our k-fault-resistant partitioning methodology to analyze multi-fault models within complex systems, such as applications processors, and to help our binary-level code analyzers to handle more generic classes of fault models.

Main Missions
  • Define a semantics for the use of contracts in the context of fault injection attacks. Potential implementations may involve a domain-specific language or annotations to describe, at the ISA-level, the effects of faults stemming from the microarchitectural level. The model must account for both spatial aspects (defining RTL/netlist-level signals to be targeted) and temporal aspects (identifying injection time intervals).
  • Explore how such security contracts can enhance microarchitectural-level analyses, in particular by integrating into fault models information from experimental characterizations of laser injections.
  • Investigate the use of security contracts to integrate microarchitectural descriptions into ISA-level analysis tools like Binsec. The expected outcome is the validation of a multi-level semantics for contracts adapted to the context of fault injection attacks, ultimately enabling the implementation of an end-to-end analysis tool.
References

See attached pdf

Candidate Profile

We are seeking a motivated researcher with:

  • A PhD in computer science, embedded systems, or related fields.
  • Expertise in fault-injection attacks, formal verification, or microarchitecture security.
  • Strong programming skills and analytical thinking. Experience with RISC-V processors, ISA-level / binary analysis tools, or domain-specific languages is a plus.

In accordance with the commitments made by the CEA in favor of the integration of people with disabilities, this job is open to everyone.

The TwinSec project is also recruiting a PhD candidate to work on the topic of security contracts for fault-injection attacker models. The Post-doc researcher will participate in the co-supervision of this PhD project and contribute to the development of the methodologies and tools designed by the PhD student.

Location

Saclay

Application Deadline

05/05/2025

Reference

2025-35303

The French Alternative Energies and Atomic Energy Commission (CEA) is a leader in research, development, and innovation across key areas such as defense and security, energy, industry, and fundamental sciences. Within CEA, the List institute focuses on technological innovation in digital systems.

Obtenez votre examen gratuit et confidentiel de votre CV.
ou faites glisser et déposez un fichier PDF, DOC, DOCX, ODT ou PAGES jusqu’à 5 Mo.