<div dir="ltr"><div class="gmail_quote"><div dir="ltr">
<div>
The BINSEC team ( <a href="https://urldefense.com/v3/__https://binsec.github.io__;!!IBzWLUs!DD1VnbNFBVrHBocvuIOIom1LMW3xgnHeTcrTV6RfG6jViqk4AyGKcK0JJBWCToG8Q1VF2r357XKKjA$" target="_blank">https://binsec.github.io</a> ) opens two PhD and one postdoc positions to work with Sébastien Bardin ( <a href="https://urldefense.com/v3/__http://sebastien.bardin.free.fr__;!!IBzWLUs!DD1VnbNFBVrHBocvuIOIom1LMW3xgnHeTcrTV6RfG6jViqk4AyGKcK0JJBWCToG8Q1VF2r3gu96O2A$" target="_blank">http://sebastien.bardin.free.fr</a> ) and Michaël Marcozzi ( <a href="https://urldefense.com/v3/__http://www.marcozzi.net__;!!IBzWLUs!DD1VnbNFBVrHBocvuIOIom1LMW3xgnHeTcrTV6RfG6jViqk4AyGKcK0JJBWCToG8Q1VF2r1aCj2iaQ$" target="_blank">http://www.marcozzi.net</a> ) on
<span><span dir="ltr">detection and prevention of advanced software vulnerabilities</span></span>.</div><div><br></div><div>(sorry if you receive duplicate versions of this email)<br></div><br><div><b>Start</b>: as soon as possible in 2022. <b><br></b></div><div><b>Duration</b>: 3 years (PhD), 2 years (postdoc).</div><b>Keywords</b>: software security, program analysis, testing, formal methods, symbolic execution, fuzzing,
micro-architectural attacks<br><b><br>Detailed job offer</b>: <a href="https://urldefense.com/v3/__https://binsec.github.io/jobs/2022/03/03/phd-postdoc-offer.html__;!!IBzWLUs!DD1VnbNFBVrHBocvuIOIom1LMW3xgnHeTcrTV6RfG6jViqk4AyGKcK0JJBWCToG8Q1VF2r0yPW8JWQ$" target="_blank">https://binsec.github.io/jobs/2022/03/03/phd-postdoc-offer.html</a><br><br><b>== ABOUT US</b><br><br>The
BINary-level SECurity research group (BINSEC) is a dynamic team of 11
junior and 4 senior researchers. The group has frequent publications in
top-tier security, formal methods and software engineering conferences. We work in close
collaboration with other French and international research teams,
industrial partners and national agencies. The team is part of
Université Paris-Saclay, the world’s 13th and European Union’s 1st
university, according to the Shanghai ARWU Ranking in 2021.<br><br>The
team has high-level expertise in several code analysis approaches,
namely symbolic execution, fuzzing and abstract interpretation. We apply
these techniques to improve software security, covering notably
vulnerability detection, code (de)obfuscation and formal verification.
See our website at <a href="https://urldefense.com/v3/__https://binsec.github.io__;!!IBzWLUs!DD1VnbNFBVrHBocvuIOIom1LMW3xgnHeTcrTV6RfG6jViqk4AyGKcK0JJBWCToG8Q1VF2r357XKKjA$" target="_blank">https://binsec.github.io</a> for additional information.<br><br><b>== JOB OFFERS SUMMARY</b><br><div><br></div><div>* One Ph.D position (3 years) in detection of complex vulnerabilities with fuzzing.
</div>* One Ph.D position (3 years) in formal verification of security properties against micro-architectural attacks.<br>* One postdoc position (2 years) in detection of complex vulnerabilities with symbolic execution and fuzzing.<br><div><br></div><div>Under
the supervision of our senior researchers, you will be expected to
solve research problems, implement your solutions into evaluated
prototypes, publish at top conferences and journals, mentor students and
broadly participate in the scientific life of the team. The positions
comprise both theoretical work and coding. You will be able to dedicate
a small fraction of your time to teaching if you want so. Our former
team members have been able to secure stimulating positions in academia
or industry and we will support you in advancing your career.</div><b><br>== APPLICATION PROCEDURE SUMMARY</b><br><br>Candidates should send a <i>CV</i>, a <i>cover letter</i>, and <i>contact information of at least two referees</i>
to <a href="mailto:binsec-jobs@saxifrage.saclay.cea.fr" target="_blank">binsec-jobs@saxifrage.saclay.cea.fr</a>
as soon as possible (and at the latest by May 2022). Applications will
be reviewed immediately as they arrive (first come, first served). The
positions are expected to start as soon as possible in 2022 (upon
completion of all administrative requirements).
</div>
</div></div>