PODC Archives

ACM PODC Participants List


Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Michaël Marcozzi <[log in to unmask]>
Reply To:
Michaël Marcozzi <[log in to unmask]>
Wed, 24 May 2023 14:33:21 +0200
text/plain (2631 bytes) , text/html (9 kB)
> The BINSEC team ( https://binsec.github.io ) opens postdoc, PhD student
and research intern positions in software security and program analysis.

*START*: as soon as possible. *DURATION*: 2-3 years (postdoc), 3 years
(PhD), 2.5-6 months (intern).

*GOALS*: vulnerability detection and analysis, software reverse engineering
and deobfuscation, binary-level formal verification and code protection

*TECHNIQUES*: symbolic execution, static analysis, fuzzing, program
synthesis, SMT solvers



*OUR TEAM* -  The BINary-level SECurity research group (BINSEC) is a
dynamic team of a dozen of researchers, which offers a stimulating and
open-minded work environment in English. The group has frequent
publications in top-tier security, formal methods and software engineering
conferences. It is part of CEA (one of the main French research
organisations, employing more than 20k researchers and persistently ranked
as a top global innovator) and of Université Paris-Saclay (the world’s 16th
and European Union’s 1st university, according to the Shanghai ARWU Ranking
in 2022).

*OUR WORK* - The team has strong expertise in several code analysis
approaches, namely symbolic execution, abstract interpretation and fuzzing.
We apply these techniques to improve software security, covering notably
vulnerability detection and analysis, code (de)obfuscation and formal
verification. See our website at https://binsec.github.io for additional


Candidates should send a CV to [log in to unmask] as soon
as possible. Applications will be reviewed as they arrive (first come,
first served), depending on our availability, and additional information
may be requested from you. *Please read the detailed job offer to prepare
your application in the best way:*



Dr. Michaël Marcozzi

Tenured Researcher

Université Paris-Saclay, CEA, List

Twitter: @michaelmarcozzi <https://twitter.com/michaelmarcozzi>





[log in to unmask]

If you don't already have a password for the LISTSERV.ACM.ORG server, we recommend
that you create one now. A LISTSERV password is linked to your email
address and can be used to access the web interface and all the lists to
which you are subscribed on the LISTSERV.ACM.ORG server.

To create a password, visit:


Once you have created a password, you can log in and view or change your
subscription settings at: