PhD offers

All our offers

+Filter by technology challenge

  • Cyber security : hardware and sofware
  • Energy efficiency for smart buildings, electrical mobility and industrial processes
  • Solar energy for energy transition
  • Green & decarbonated energy including bioprocesses and waste recycling
  • Additive manufacturing, new routes for saving materials
  • Support functions
  • Advanced hydrogen and fuel-cells solutions for energy transition
  • Instrumentation nucléaire et métrologie des rayonnements ionisants
  • Artificial Intelligence & data intelligence
  • New computing paradigms, including quantum
  • Emerging materials and processes for nanotechnologies and microelectronics
  • Advanced nano characterization
  • Photonics, Imaging and displays
  • Communication networks, IOT, radiofrequencies and antennas
  • Smart Energy grids
  • Numerical simulation & modelling
  • Stockage d'énergie électrochimique y compris les batteries pour la transition énergétique
  • Cyber physical systems - sensors and actuators
  • Health and environment technologies, medical devices
  • Factory of the future incl. robotics and non destructive testing

+Filter by institute

  • CEA-LETI
  • CEA-LIST
  • CEA Tech en Région

+Filter by location

  • Grenoble
  • Saclay
Number of results : 4
  • Cyber security : hardware and sofware Code-Reuse Attacks : Automated Exploitation and Defense

    Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E). Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to...

    Learn more

  • Cyber security : hardware and sofware Dynamic Assurance Cases for Autonomous Adaptive Systems

    Providing assurances that autonomous systems will operate in a safe and secure manner is a prerequisite for their deployment in mission-critical and safety-critical application domains. Typically, assurances are provided in the form of assurance cases, which are auditable and reasoned arguments that a high-level claim (usually concerning safety or other critical properties) is satisfied given...

    Learn more

  • Cyber security : hardware and sofware Integrity, availability and confidentiality of embedded AI in post-training stages

    With a strong context of regulation of AI at the European scale, several requirements have been proposed for the "cybersecurity of AI" and more particularly to increase the security of complex modern AI systems. Indeed, we are experience an impressive development of large models (so-called “Foundation” models) that are deployed at large-scale to be adapted...

    Learn more

  • Cyber security : hardware and sofware Laser Fault Injection Physical Modelling in FD-SOI technologies: toward security at standard cells level on FD-SOI 10 nm node

    The cybersecurity of our infrastructures is at the very heart in the digital transition on-going, and security must be ensured throughout the entire chain. At the root of trust lies the hardware, integrated circuits providing essential functions for the integrity, confidentiality and availability of processed information. But hardware is vulnerable to physical attacks, and defence...

    Learn more

en_USEN

Contact us

We will reply as soon as possible...