[TYPES/announce] Postdoc, PhD and intern positions at Université Paris-Saclay, CEA List institute, France, in Software Security and Program Analysis

Michaël Marcozzi michael.marcozzi at gmail.com
Wed Oct 26 06:59:42 EDT 2022


The BINSEC team ( https://urldefense.com/v3/__https://binsec.github.io__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYU2-X7YE$   ) opens postdoc, PhD student and
research intern positions in software security and program analysis.



*START*: as soon as possible. *DURATION*: 2-3 years (postdoc), 3 years
(PhD), 2.5-6 months (intern).

*GOALS*: vulnerability detection and analysis, software reverse engineering
and deobfuscation, binary-level formal verification and code protection

*TECHNIQUES*: symbolic execution, static analysis, fuzzing, program
synthesis, SMT solvers



        https://urldefense.com/v3/__https://binsec.github.io/jobs/open/2022/10/25/phd-postdoc-offer.html__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYe17xbsq$  




*== ABOUT US*



*OUR TEAM* -  The BINary-level SECurity research group (BINSEC) is a
dynamic team of 4 senior and 9 junior researchers, which offers a
stimulating and open-minded work environment in English. The group has
frequent publications in top-tier security, formal methods and software
engineering conferences. It is part of CEA (one of the main French research
organisations, employing more than 20k researchers and persistently ranked
as a top global innovator) and of Université Paris-Saclay (the world’s 16th
and European Union’s 1st university, according to the Shanghai ARWU Ranking
in 2022).



*OUR WORK* - The team has strong expertise in several code analysis
approaches, namely symbolic execution, abstract interpretation and fuzzing.
We apply these techniques to improve software security, covering notably
vulnerability detection and analysis, code (de)obfuscation and formal
verification. See our website at https://urldefense.com/v3/__https://binsec.github.io__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYU2-X7YE$   for additional
information.



*== APPLICATION*



Candidates should send a CV to binsec-jobs at saxifrage.saclay.cea.fr as soon
as possible. Applications will be reviewed as they arrive (first come,
first served), depending on our availability, and additional information
may be requested from you. *Please read the detailed job offer to prepare
your application in the best way:*



        https://urldefense.com/v3/__https://binsec.github.io/jobs/open/2022/10/25/phd-postdoc-offer.html__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYe17xbsq$  






---

Dr. Michaël Marcozzi

Tenured Researcher

Université Paris-Saclay, CEA, List

Twitter: @michaelmarcozzi <https://urldefense.com/v3/__https://twitter.com/michaelmarcozzi__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYdA6nCZ7$  >

https://urldefense.com/v3/__http://www.marcozzi.net__;!!IBzWLUs!S_FO1rvjvwKrcdv9zWoUzaZqadwYQ2qciX9KeX7DbhOOE8NNqeBwYqTdLEk4Z1VZ1UdKW2lFrDgTYc6Zj_aEwlC2klXA3mfUYcSaxScz$  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://LISTS.SEAS.UPENN.EDU/pipermail/types-announce/attachments/20221026/a82d18d5/attachment-0001.htm>


More information about the Types-announce mailing list