PODC Archives

ACM PODC Participants List


Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Michaël Marcozzi <[log in to unmask]>
Reply To:
Michaël Marcozzi <[log in to unmask]>
Wed, 26 Oct 2022 12:59:42 +0200
text/plain (2718 bytes) , text/html (9 kB)
The BINSEC team ( https://binsec.github.io ) opens postdoc, PhD student and
research intern positions in software security and program analysis.

*START*: as soon as possible. *DURATION*: 2-3 years (postdoc), 3 years
(PhD), 2.5-6 months (intern).

*GOALS*: vulnerability detection and analysis, software reverse engineering
and deobfuscation, binary-level formal verification and code protection

*TECHNIQUES*: symbolic execution, static analysis, fuzzing, program
synthesis, SMT solvers



*OUR TEAM* -  The BINary-level SECurity research group (BINSEC) is a
dynamic team of 4 senior and 9 junior researchers, which offers a
stimulating and open-minded work environment in English. The group has
frequent publications in top-tier security, formal methods and software
engineering conferences. It is part of CEA (one of the main French research
organisations, employing more than 20k researchers and persistently ranked
as a top global innovator) and of Université Paris-Saclay (the world’s 16th
and European Union’s 1st university, according to the Shanghai ARWU Ranking
in 2022).

*OUR WORK* - The team has strong expertise in several code analysis
approaches, namely symbolic execution, abstract interpretation and fuzzing.
We apply these techniques to improve software security, covering notably
vulnerability detection and analysis, code (de)obfuscation and formal
verification. See our website at https://binsec.github.io for additional


Candidates should send a CV to [log in to unmask] as soon
as possible. Applications will be reviewed as they arrive (first come,
first served), depending on our availability, and additional information
may be requested from you. *Please read the detailed job offer to prepare
your application in the best way:*



Dr. Michaël Marcozzi

Tenured Researcher

Université Paris-Saclay, CEA, List

Twitter: @michaelmarcozzi <https://twitter.com/michaelmarcozzi>




[log in to unmask]

If you don't already have a password for the LISTSERV.ACM.ORG server, we recommend
that you create one now. A LISTSERV password is linked to your email
address and can be used to access the web interface and all the lists to
which you are subscribed on the LISTSERV.ACM.ORG server.

To create a password, visit:


Once you have created a password, you can log in and view or change your
subscription settings at: