The BINSEC team ( https://binsec.github.io ) opens postdoc, PhD student and research intern positions in software security and program analysis.
START: as soon as possible. DURATION: 2-3 years (postdoc), 3 years (PhD), 2.5-6 months (intern).
GOALS: vulnerability detection and analysis, software reverse engineering and deobfuscation, binary-level formal verification and code protection
TECHNIQUES: symbolic execution, static analysis, fuzzing, program synthesis, SMT solvers
== ABOUT US
OUR TEAM - The BINary-level SECurity research group (BINSEC) is a dynamic team of a dozen of researchers, which offers a stimulating and open-minded work environment in English. The group has frequent publications in top-tier security, formal methods and software engineering conferences. It is part of CEA (one of the main French research organisations, employing more than 20k researchers and persistently ranked as a top global innovator) and of Université Paris-Saclay (the world’s 16th and European Union’s 1st university, according to the Shanghai ARWU Ranking in 2022).
OUR WORK - The team has strong expertise in several code analysis approaches, namely symbolic execution, abstract interpretation and fuzzing. We apply these techniques to improve software security, covering notably vulnerability detection and analysis, code (de)obfuscation and formal verification. See our website at https://binsec.github.io for additional information.
== APPLICATION
Candidates should send a CV to [log in to unmask] as soon as possible. Applications will be reviewed as they arrive (first come, first served), depending on our availability, and additional information may be requested from you. Please read the detailed job offer to prepare your application in the best way:
Dr. Michaël Marcozzi
Tenured Researcher
Université Paris-Saclay, CEA, List
Twitter: @michaelmarcozzi
Unsubscribe:
If you don't already have a password for the LISTSERV.ACM.ORG server, we recommend that you create one now. A LISTSERV password is linked to your email address and can be used to access the web interface and all the lists to which you are subscribed on the LISTSERV.ACM.ORG server.
To create a password, visit:
https://LISTSERV.ACM.ORG/SCRIPTS/WA-ACMLPX.CGI?GETPW1
Once you have created a password, you can log in and view or change your subscription settings at:
https://LISTSERV.ACM.ORG/SCRIPTS/WA-ACMLPX.CGI?SUBED1=PODC