PhD offers
All our offers
Number of results : 2
-
Cyber security : hardware and sofware
Code-Reuse Attacks : Automated Exploitation and Defense
Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E). Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to...
-
Factory of the future incl. robotics and non destructive testing
3D ultrasound imaging using orthogonal row and column addressing of the matrix array for ultrasonic NDT
This thesis is part of the activities of the Digital Instrumentation Department (DIN) in Non-Destructive Testing (NDT), and aims to design a new, fast and advanced 3D ultrasound imaging method using matrix arrays. The aim will be to produce three-dimensional ultrasound images of the internal volume of a structure that may contain defects (e.g. cracks),...