Jobs
All our offers
-
PostDoc
Application of formal methods for interferences management
Within a multidisciplinary technological research team of experts in SW/HW co-design tools by applying formal methods, you will be involved in a national research project aiming at developing an environment to identify, analyze and reduce the interferences generated by the concurrent execution of applications on a heterogeneous commercial-off-the-shelf (COTS) multi-core hardware platform.
-
Fixed term contract
Research Engineer in component Security H/F
The position concerns the implementation of hardware countermeasures in processor architectures based on the RISC-V ISA. The missions are as follows : • RTL implementation, verification and documentation of security IPs then their integration into RISC-V processors emulated on FPGA. • Verification of CPU operation before and after integration of countermeasures. • Development of demonstrator...
-
phD
Code-Reuse Attacks : Automated Exploitation and Defense
Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E). Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to...
-
phD
Dynamic Assurance Cases for Autonomous Adaptive Systems
Providing assurances that autonomous systems will operate in a safe and secure manner is a prerequisite for their deployment in mission-critical and safety-critical application domains. Typically, assurances are provided in the form of assurance cases, which are auditable and reasoned arguments that a high-level claim (usually concerning safety or other critical properties) is satisfied given...
-
phD
Integrity, availability and confidentiality of embedded AI in post-training stages
With a strong context of regulation of AI at the European scale, several requirements have been proposed for the quot;cybersecurity of AIquot; and more particularly to increase the security of complex modern AI systems. Indeed, we are experience an impressive development of large models (so-called “Foundation” models) that are deployed at large-scale to be adapted...
-
phD
Laser Fault Injection Physical Modelling in FD-SOI technologies: toward security at standard cells level on FD-SOI 10 nm node
The cybersecurity of our infrastructures is at the very heart in the digital transition on-going, and security must be ensured throughout the entire chain. At the root of trust lies the hardware, integrated circuits providing essential functions for the integrity, confidentiality and availability of processed information. But hardware is vulnerable to physical attacks, and defence...
-
phD
Identification versus anonymisation from an embedded client operating on a blockchain
The first worldwide deployment of a blockchain dates back to 2010 with Bitcoin, which introduced a completely digital monetary system and a crypto-currency, bitcoin. Within Bitcoin, all transactions are publicly accessible and traceable, which should generate trust between stakeholders. However, the traceability of transactions, and ultimately of the crypto-currency, does not imply the traceability of...
-
phD
Embedded local blockchain on secure physical devices
The blockchain is based on a consensus protocol, the aim of which is to share and replicate ordered data between peers in a distributed network. The protocol stack, embedded in the network's peer devices, relies on a proof mechanism that certifies the timestamp and ensures a degree of fairness within the network. The consensus protocols...
-
Fixed term contract
Using LLMs for the specification of data sharing policies - CDD - Paris-Saclay F/H
“Join the CEA to give meaning to your activity, lead and support national and international R&D projects, cultivate and bring to life your spirit of curiosity.” IN SUMMARY, WHAT DO WE OFFER YOU? The CEA is looking for an Engineer in use of LLMs for the specification of data sharing policies for the CEA/DRT (Technological...
-
Internship
Improving the Effectiveness of LLM-Assisted ISS Generation from Design Specification H/F
The internship aims to enhance the performance of large language models (LLMs) in generating Instruction Set Simulator (ISS) code by using Reinforcement Learning (RL) to optimize and automate prompt tuning. Additionally, the internship seeks to expand dataset coverage by using simulators such as QEMU (Quick Emulator) in-the-loop to simulate and evaluate a wider range of...
-
phD
Securing Against Side-Channel Attacks by Combining Lightweight Software Countermeasures
Side-channel attacks, such as analyzing a processorapos;s electrical consumption or electromagnetic emissions, allow for the recovery of sensitive information, including cryptographic keys. These attacks are particularly effective and pose a serious threat to the security of embedded systems. This thesis focuses on combining low-impact software countermeasures to strengthen security against side-channel attacks, an idea that...
-
phD
eBeam Probing
The design of integrated circuits requires, at the end of the chain, circuit editing and failure analysis tools. One of these tools is the probing of electrical potential levels using an electron beam available in a SEM (Scanning Electron Microscope) to determine the electrical signal present in an area of the circuit, which may be...
-
phD
Combining over and underapproximation of memory abstractions for low-level code analysis
Riceapos;s theorem stating that no method can automatically tell whether a property of a program is true or not has led to the separation of verification tools into two groups: sound tools operating by over-approximation, such as abstract interpretation, are able to automatically prove that certain properties are true, but are sometimes unable to conclude...
-
phD
Cryptographic security of RISC-V processor enclaves with CHERI
CHERI (Capability Hardware Enhanced RISC Instructions) is a solution for securing the processor against spatial and temporal memory leaks by transforming any pointer into a capability that clearly defines the access limits to the data or instructions addressed. In this thesis, we propose to enrich CHERI and its control-flow integrity capabilities on a RISC-V application...
-
phD
New machine learning methods applied to side-channel attacks
Products secured by embedded cryptographic mechanisms may be vulnerable to side-channel attacks. Such attacks are based on the observation of some physique quantities measured during the device activity, whose variation may provoke information leakage and lead to a security flaw. Today, such attacks are improved, even in presence of specific countermeasures, by deep learning based...
-
phD
CCA-secure constructions for FHE
Fully Homomorphic Encryption (FHE) is a corpus of cryptographic techniques that allow to compute directly over encrypted data. Since its inception around 15 years ago, FHE has been the subject of a lot of research towards more efficiency and better practicality. From a security perspective, however, FHE still raises a number of questions and challenges....
-
phD
Acoustics and Electromagnetism (AEM): New approaches for the secure characterization of components such as the SoCs
Work carried out within CEA-Leti has shown that physical attacks can be a threat to the security mechanisms of SoCs (System on Chips). Indeed, fault injections by electromagnetic disturbance have already led to an escalation of privileges by authenticating with an illegitimate password, or more recently have made it possible to bypass one of the...
-
phD
HW/SW Contracts for Security Analysis Against Fault Injection Attacks on Open-source Processors
This thesis focuses on the cybersecurity of embedded systems, particularly the vulnerability of processors and programs to fault injection attacks. These attacks disrupt the normal functioning of systems, allowing attackers to exploit weaknesses to access sensitive information. Although formal methods have been developed to analyze the robustness of systems, they often limit their analyses to...
-
Fixed term contract
Evaluateur en cryptographie et attaques par observation - CDD - Grenoble H/F
Nous rejoindre, pour quoi faire ? Pour développer et conduire des attaques par observation sur du matériel électronique. Vos missions seront de : contribuer aux tâches d’évaluation selon la méthodologie des critères communs ou de schémas privés : analyse de l'implémentation d'une fonction de sécurité (génération d'aléas, algorithmes cryptographiques, chiffrement d'une mémoire, etc.) concevoir et réaliser des attaques...
-
Fixed term contract
Evaluateur en attaques semi-invasives H/F
Le poste proposé dans le cadre du laboratoire CESTI correspond à une évaluatrice / un évaluateur en attaque semi-invasive. Il consiste en la réalisation de tests par perturbation lumineuse ou électromagnétique (injection de fautes). Fort de votre curiosité et de votre imagination pour challenger un composant sécurisé, vous effectuerez des tests de pénétration en utilisant...
-
Permanent contract
Evaluateur en sécurité électronique et conformité par critères communs H/F
NOUS REJOINDRE, POUR FAIRE QUOI ? Le CESTI du LETI cherche à renforcer son équipe d’évaluateurs en analyse de conformité et tests associés selon la méthodologie des Critères Communs. Votre mission sera de : mener l’analyse de conformité de produits sécurisés selon la méthodologie des Critères Communs mener les tests indépendants requis pour vérifier les...
-
Fixed term contract
CDD Ingénieur en simulations multiphysiques - Machines tournantes / Piézoélectricité H/F
Nous recherchons un ingénieur en simulations multiphysiques pour modéliser et simuler des machines tournantes (avec un focus particulier sur les moteurs à aimants permanents) et des systèmes piézoélectriques. Vous serez responsable de développer des modèles multiphysiques, en utilisant des outils avancés comme Simulink pour la modélisation système et un logiciel de simulation par éléments finis...
-
Internship
Implementation and Evaluation of Innovative Algorithms for Memory Testing in Integrated Circuits H/F
In this context, LFIM, in collaboration with the Laboratory of Computer Science, Robotics, and Microelectronics of Montpellier (LIRMM), has explored the testability of memories integrated into NMC systems, leveraging the existing computing capabilities in such architectures. As a result of the collaboration between these institutions, an initial theoretical study was conducted on the integration of...
-
Fixed term contract
Ingénieur Concepteur FPGA – Capteurs pour le contrôle qualité de biomédicaments - CDD 18 mois H/F
La filière des industries de santé et les patients vivent depuis une vingtaine d’années une véritable révolution avec l'arrivée de biomédicaments dont les principes actifs sont produits à partir du vivant et issus des recherches les plus fondamentales en biotechnologies. Ces biomédicaments apportent des solutions nouvelles et de nouveaux espoirs de traitements dans de multiples...
-
Permanent contract
Ingénieur chercheur en Propagation hyperfréquence H/F
Dans le cadre des activités R&D du laboratoire antennes, propagation et couplage inductif (LAPCI) du CEA-LETI, le ou la candidat.e sera en charge de l’étude du canal de propagation pour des applications de télécommunications et de capteurs électromagnétiques innovants de type radar. Ces recherches contribueront au développement de nouvelles technologies de communication et de détection...
-
phD
Secure and Agile Hardware/Software Implementation of new Post-Quantum Cryptography Digital Signature Algorithms
Cryptography plays a fundamental role in securing modern communication systems by ensuring confidentiality, integrity, and authenticity. Public-key cryptography, in particular, has become indispensable for secure data exchange and authentication processes. However, the advent of quantum computing poses an existential threat to many of the traditional public-key cryptographic algorithms, such as RSA, DSA, and ECC, which...
-
phD
Defense of scene analysis models against adversarial attacks
In many applications, scene analysis modules such as object detection and recognition, or pose recognition, are required. Deep neural networks are nowadays among the most efficient models to perform a large number of vision tasks, sometimes simultaneously in case of multitask learning. However, it has been shown that they are vulnerable to adversarial attacks: Indeed,...
-
Fixed term contract
Hardware/software cybersecurity of embedded systems H/F
Context: Fault injection allows an attacker to move the target processor out of its expected functioning bounds. A hardware perturbation, by means of a fault injection, aims at inducing logical changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is...
-
phD
Laser Fault Injection Applied to Reverse Engineering of Memories
Memories play a critical role for the security of cyber-physical systems. They manage sensitive data such as cryptographic keys and proprietary codes. With the increasing threat of hardware attacks, understanding and manipulating memory organization has become essential. The thesis aims to explore the application of laser attack techniques, specifically Thermal Laser Stimulation (TLS) and laser...
-
PostDoc
Design and Implementation of a Neural Network for Thermo-Mechanical Simulation in Additive Manufacturing
The WAAM (Wire Arc Additive Manufacturing) process is a metal additive manufacturing method that allows for the production of large parts with a high deposition rate. However, this process results in highly stressed and deformed parts, making it complex to predict their geometric and mechanical characteristics. Thermomechanical modeling is crucial for predicting these deformations, but...
-
PostDoc
High-performance computing using CMOS technology at cryogenic temperature
Advances in materials, transistor architectures, and lithography technologies have enabled exponential growth in the performance and energy efficiency of integrated circuits. New research directions, including operation at cryogenic temperatures, could lead to further progress. Cryogenic electronics, essential for manipulating qubits at very low temperatures, is rapidly developing. Processors operating at 4.2 K using 1.4 zJ...
-
Fixed term contract
Ingénieur-chercheur en développement librairies mathématiques - CDD/Post-doc H/F
Nous recherchons un CDD ou post-doctorat de 18 mois pour réaliser des développements mathématiques et d'implémenter, sur architecture GPU, les librairies logicielles permettant de : 1/ Générer les surfaces spline MBA à partir d'un nuage de points exprimés dans un système de coordonnées génériques curvilignes. 2/ Calculer leur intersection avec des rayons. Au sein de...
-
Internship
Exploring the Generalizability of ML-driven Model Generation for HW Design H/F
This internship aims to develop a methodology for constructing machine learning (ML)-based models that effectively generalize across the design space of the CVA6 processor. The objective is to predict performance, power, and area (PPA) metrics based on hardware configurations while reducing the number of required simulations. One aspect of the internship involves conducting a comprehensive...
-
phD
Attacker model validation for laser-based attacks on integrated circuits
The security of embedded systems is nowadays a fundamental issue in many domains: IoT, Automotive, Aeronautics, among others. The physical attacks are a specific threat assuming a physical access to the target. In particular, fault injection attacks on the integrated circuits (IC) allows to disturb the system in order to retrieve secret material or to...
-
Fixed term contract
Ingénieur-chercheur en Vision par ordinateur pour la robotique - CDD - Paris-Saclay F/H
« Rejoignez le CEA pour donner du sens à votre activité, mener et soutenir des projets de R&D nationaux et internationaux, cultiver et faire vivre votre esprit de curiosité. » EN SYNTHESE, QU’EST-CE QUE NOUS VOUS PROPOSONS ? Le CEA recherche un(e) ingénieur(e)-chercheur(se) en Vision par ordinateur pour la robotique pour la CEA/DRT (Direction de la...
-
Work-study contract
Développeur Python en alternance pour le DataLab - 24 mois - Grenoble - H/F
Le DataLab de la DRT est un incubateur de projets, qui fournit un lieu, des méthodes et des outils communs, à des acteurs aux compétences complémentaires, réunis pour résoudre un problème ou proposer une solution innovante autour de la donnée. Son rôle, au service des chercheurs et des managers, est d'exploiter l'ensemble des sources de...
-
Fixed term contract
THESE - Transmission de puissance via un lien acoustique pour les milieux métalliques clos H/F
Sujet de thèse : Ce sujet de thèse se positionne sur les thématiques de transmission de puissance et de données à travers des parois métalliques en utilisant les ondes acoustiques. Cette technologie permettra à terme l’alimentation, la lecture et la commande de systèmes placés dans des zones enfermées dans du métal: réservoirs sous pression, coques...
-
Fixed term contract
THESE - Reconstruction numérique d'une cuve pour l'amélioration de l'instrumentation de suivi H/F
Sujet de thèse : Les cuves industrielles sont au cœur de nombreux procédés dans les industries biomédicales, agroalimentaires, industrielles et énergétiques, où elles assurent des fonctions cruciales telles que le mélange, le stockage et la transformation de fluides. Pour garantir une efficacité maximale des opérations et un contrôle rigoureux des processus, il est indispensable de...
-
Permanent contract
Chef du laboratoire CESTI (Centre d'Evaluation de la Sécurité des Technologies de l'Information) H/F
NOUS REJOINDRE, POUR FAIRE QUOI ? Le rôle principal du Chef de Laboratoire CESTI est d'organiser, de coordonner et de piloter tous les projets d'évaluation sécuritaire en cours, en fonction des besoins clients et des contraintes internes du laboratoire. Il a aussi en charge le management des ressources qui lui sont confiées. Pour ce faire,...