Jobs
All our offers
-
PostDoc
Application of formal methods for interferences management
Within a multidisciplinary technological research team of experts in SW/HW co-design tools by applying formal methods, you will be involved in a national research project aiming at developing an environment to identify, analyze and reduce the interferences generated by the concurrent execution of applications on a heterogeneous commercial-off-the-shelf (COTS) multi-core hardware platform.
-
phD
Dynamic Assurance Cases for Autonomous Adaptive Systems
Providing assurances that autonomous systems will operate in a safe and secure manner is a prerequisite for their deployment in mission-critical and safety-critical application domains. Typically, assurances are provided in the form of assurance cases, which are auditable and reasoned arguments that a high-level claim (usually concerning safety or other critical properties) is satisfied given...
-
phD
Integrity, availability and confidentiality of embedded AI in post-training stages
With a strong context of regulation of AI at the European scale, several requirements have been proposed for the quot;cybersecurity of AIquot; and more particularly to increase the security of complex modern AI systems. Indeed, we are experience an impressive development of large models (so-called “Foundation” models) that are deployed at large-scale to be adapted...
-
phD
Laser Fault Injection Physical Modelling in FD-SOI technologies: toward security at standard cells level on FD-SOI 10 nm node
The cybersecurity of our infrastructures is at the very heart in the digital transition on-going, and security must be ensured throughout the entire chain. At the root of trust lies the hardware, integrated circuits providing essential functions for the integrity, confidentiality and availability of processed information. But hardware is vulnerable to physical attacks, and defence...
-
phD
Identification versus anonymisation from an embedded client operating on a blockchain
The first worldwide deployment of a blockchain dates back to 2010 with Bitcoin, which introduced a completely digital monetary system and a crypto-currency, bitcoin. Within Bitcoin, all transactions are publicly accessible and traceable, which should generate trust between stakeholders. However, the traceability of transactions, and ultimately of the crypto-currency, does not imply the traceability of...
-
phD
Embedded local blockchain on secure physical devices
The blockchain is based on a consensus protocol, the aim of which is to share and replicate ordered data between peers in a distributed network. The protocol stack, embedded in the network's peer devices, relies on a proof mechanism that certifies the timestamp and ensures a degree of fairness within the network. The consensus protocols...
-
phD
eBeam Probing
The design of integrated circuits requires, at the end of the chain, circuit editing and failure analysis tools. One of these tools is the probing of electrical potential levels using an electron beam available in a SEM (Scanning Electron Microscope) to determine the electrical signal present in an area of the circuit, which may be...
-
phD
Combining over and underapproximation of memory abstractions for low-level code analysis
Riceapos;s theorem stating that no method can automatically tell whether a property of a program is true or not has led to the separation of verification tools into two groups: sound tools operating by over-approximation, such as abstract interpretation, are able to automatically prove that certain properties are true, but are sometimes unable to conclude...
-
phD
Cryptographic security of RISC-V processor enclaves with CHERI
CHERI (Capability Hardware Enhanced RISC Instructions) is a solution for securing the processor against spatial and temporal memory leaks by transforming any pointer into a capability that clearly defines the access limits to the data or instructions addressed. In this thesis, we propose to enrich CHERI and its control-flow integrity capabilities on a RISC-V application...
-
phD
New machine learning methods applied to side-channel attacks
Products secured by embedded cryptographic mechanisms may be vulnerable to side-channel attacks. Such attacks are based on the observation of some physique quantities measured during the device activity, whose variation may provoke information leakage and lead to a security flaw. Today, such attacks are improved, even in presence of specific countermeasures, by deep learning based...
-
phD
HW/SW Contracts for Security Analysis Against Fault Injection Attacks on Open-source Processors
This thesis focuses on the cybersecurity of embedded systems, particularly the vulnerability of processors and programs to fault injection attacks. These attacks disrupt the normal functioning of systems, allowing attackers to exploit weaknesses to access sensitive information. Although formal methods have been developed to analyze the robustness of systems, they often limit their analyses to...
-
Fixed term contract
Evaluateur en cryptographie et attaques par observation - CDD - Grenoble H/F
Nous rejoindre, pour quoi faire ? Pour développer et conduire des attaques par observation sur du matériel électronique. Vos missions seront de : contribuer aux tâches d’évaluation selon la méthodologie des critères communs ou de schémas privés : analyse de l'implémentation d'une fonction de sécurité (génération d'aléas, algorithmes cryptographiques, chiffrement d'une mémoire, etc.) concevoir et réaliser des attaques...
-
phD
Acoustics and Electromagnetism (AEM): New approaches for the secure characterization of components such as the SoCs
Work carried out within CEA-Leti has shown that physical attacks can be a threat to the security mechanisms of SoCs (System on Chips). Indeed, fault injections by electromagnetic disturbance have already led to an escalation of privileges by authenticating with an illegitimate password, or more recently have made it possible to bypass one of the...
-
Fixed term contract
Evaluateur en attaques semi-invasives H/F
Le poste proposé dans le cadre du laboratoire CESTI correspond à une évaluatrice / un évaluateur en attaque semi-invasive. Il consiste en la réalisation de tests par perturbation lumineuse ou électromagnétique (injection de fautes). Fort de votre curiosité et de votre imagination pour challenger un composant sécurisé, vous effectuerez des tests de pénétration en utilisant...
-
Permanent contract
Evaluateur en sécurité électronique et conformité par critères communs H/F
NOUS REJOINDRE, POUR FAIRE QUOI ? Le CESTI du LETI cherche à renforcer son équipe d’évaluateurs en analyse de conformité et tests associés selon la méthodologie des Critères Communs. Votre mission sera de : mener l’analyse de conformité de produits sécurisés selon la méthodologie des Critères Communs mener les tests indépendants requis pour vérifier les...
-
phD
Secure and Agile Hardware/Software Implementation of new Post-Quantum Cryptography Digital Signature Algorithms
Cryptography plays a fundamental role in securing modern communication systems by ensuring confidentiality, integrity, and authenticity. Public-key cryptography, in particular, has become indispensable for secure data exchange and authentication processes. However, the advent of quantum computing poses an existential threat to many of the traditional public-key cryptographic algorithms, such as RSA, DSA, and ECC, which...
-
phD
Defense of scene analysis models against adversarial attacks
In many applications, scene analysis modules such as object detection and recognition, or pose recognition, are required. Deep neural networks are nowadays among the most efficient models to perform a large number of vision tasks, sometimes simultaneously in case of multitask learning. However, it has been shown that they are vulnerable to adversarial attacks: Indeed,...
-
phD
Laser Fault Injection Applied to Reverse Engineering of Memories
Memories play a critical role for the security of cyber-physical systems. They manage sensitive data such as cryptographic keys and proprietary codes. With the increasing threat of hardware attacks, understanding and manipulating memory organization has become essential. The thesis aims to explore the application of laser attack techniques, specifically Thermal Laser Stimulation (TLS) and laser...
-
PostDoc
Design and Implementation of a Neural Network for Thermo-Mechanical Simulation in Additive Manufacturing
The WAAM (Wire Arc Additive Manufacturing) process is a metal additive manufacturing method that allows for the production of large parts with a high deposition rate. However, this process results in highly stressed and deformed parts, making it complex to predict their geometric and mechanical characteristics. Thermomechanical modeling is crucial for predicting these deformations, but...
-
PostDoc
High-performance computing using CMOS technology at cryogenic temperature
Advances in materials, transistor architectures, and lithography technologies have enabled exponential growth in the performance and energy efficiency of integrated circuits. New research directions, including operation at cryogenic temperatures, could lead to further progress. Cryogenic electronics, essential for manipulating qubits at very low temperatures, is rapidly developing. Processors operating at 4.2 K using 1.4 zJ...
-
Fixed term contract
THESE - Transmission de puissance via un lien acoustique pour les milieux métalliques clos H/F
Sujet de thèse : Ce sujet de thèse se positionne sur les thématiques de transmission de puissance et de données à travers des parois métalliques en utilisant les ondes acoustiques. Cette technologie permettra à terme l’alimentation, la lecture et la commande de systèmes placés dans des zones enfermées dans du métal: réservoirs sous pression, coques...
-
Fixed term contract
THESE - Reconstruction numérique d'une cuve pour l'amélioration de l'instrumentation de suivi H/F
Sujet de thèse : Les cuves industrielles sont au cœur de nombreux procédés dans les industries biomédicales, agroalimentaires, industrielles et énergétiques, où elles assurent des fonctions cruciales telles que le mélange, le stockage et la transformation de fluides. Pour garantir une efficacité maximale des opérations et un contrôle rigoureux des processus, il est indispensable de...
-
Permanent contract
Chef du laboratoire CESTI (Centre d'Evaluation de la Sécurité des Technologies de l'Information) H/F
NOUS REJOINDRE, POUR FAIRE QUOI ? Le rôle principal du Chef de Laboratoire CESTI est d'organiser, de coordonner et de piloter tous les projets d'évaluation sécuritaire en cours, en fonction des besoins clients et des contraintes internes du laboratoire. Il a aussi en charge le management des ressources qui lui sont confiées. Pour ce faire,...
-
Fixed term contract
Ingénieur-Chercheur en méthodes formelles et IA pour la cybersécurité logicielle bas niveau F/H
« Rejoignez le CEA pour donner du sens à votre activité, mener et soutenir des projets de R&D nationaux et internationaux, cultiver et faire vivre votre esprit de curiosité. » EN SYNTHESE, QU’EST-CE QUE NOUS VOUS PROPOSONS ? Le Commissariat à l'Énergie Atomique et aux Énergies Alternatives (CEA) recherche un(e) Ingénieur-Chercheur en méthodes formelles et...
-
Fixed term contract
Ingénieur en visualisation et environnement de développement - CDD - Paris-Saclay F/H
« Rejoignez le CEA pour donner du sens à votre activité, mener et soutenir des projets de R&D nationaux et internationaux, cultiver et faire vivre votre esprit de curiosité. » EN SYNTHESE, QU’EST-CE QUE NOUS VOUS PROPOSONS ? Le CEA recherche un.e Ingénieur.e en visualisation et environnement de développement pour la CEA/DRT (Direction de la Recherche Technologique). Ce poste de...
-
Internship
État de l'art des incitations et échanges pour la sûreté des registres distribués. H/F
Contexte: Le succès des applications financières des Blockchains a mis en lumière les Technologies de Registres Distribués sous-jacentes, mais aussi certaines de leurs vulnérabilités. En effet, les attaques MEV tirent parti des mécanismes d’incitation (gas reward) afin de manipuler l’ordre des transactions pour extraire des profits. Cette vulnérabilité vient du fait que la plupart des...
-
PostDoc
Modeling and integrating Local-First Data Types
Existing modeling frameworks have limited collaboration capabilities. Collaboration at model level is one of the top desired features as identified in the literature. However, most port of solutions primarily rely on cloud-based and centralized databases as their technological solution. While these solutions ease collaboration among connected partners by employing concurrency control techniques or adopting a...
-
phD
Adaptive and explainable Video Anomaly Detection
Video Anomaly Detection (VAD) aims to automatically identify unusual events in video that deviate from normal patterns. Existing methods often rely on One-Class or Weakly Supervised learning: the former uses only normal data for training, while the latter leverages video-level labels. Recent advances in Vision-Language Models (VLMs) and Large Language Models (LLMs) have improved both...
-
phD
Grounding and reasoning over space and time in Vision-Language Models (VLM)
Recent Vision-Language Models (VLMs) like BLIP, LLaVA, and Qwen-VL have achieved impressive results in multimodal tasks but still face limitations in true spatial and temporal reasoning. Many current benchmarks conflate visual reasoning with general knowledge and involve shallow reasoning tasks. Furthermore, these models often struggle with understanding complex spatial relations and dynamic scenes due to...
-
phD
Physics informed deep learning for non-destructive testing
This PhD project lies within the field of Non-Destructive Testing (NDT), which encompasses a range of techniques used to detect defects in structures (cables, materials, components) without causing any damage. Diagnostics rely on physical measurements (e.g., reflectometry, ultrasound), whose interpretation requires solving inverse problems, which are often ill-posed. Classical approaches based on iterative algorithms are...
-
phD
AI Enhanced MBSE framework for joint safety and security analysis of critical systems
Critical systems must simultaneously meet the requirements of both Safety (preventing unintentional failures that could lead to damage) and Security (protecting against malicious attacks). Traditionally, these two areas are treated separately, whereas they are interdependent: An attack (Security) can trigger a failure (Safety), and a functional flaw can be exploited as an attack vector. MBSE...
-
phD
Robust and Secure Federated Learning
Federated Learning (FL) allows multiple clients to collaboratively train a global model without sharing their raw data. While this decentralized setup is appealing for privacy-sensitive domains like healthcare and finance, it is not inherently secure: model updates can leak private information, and malicious clients can corrupt training. To tackle these challenges, two main strategies are...
-
phD
Towards Reliable and Autonomous Workflow Coordination in Agentic AI-Based Systems
The rise of Large Language Models (LLMs) and agentic AI systems is transforming how complex workflows are designed and managed. Unlike traditional centralized orchestration, modern workflows must support distributed, autonomous agents operating across cloud, edge, and on-premise environments. These agents collaborate with humans and other systems, adapt to evolving goals, and cross organizational and trust...
-
phD
GenPhi : 3D Generative AI conditioned by geometry, structure and physics
The aim of this thesis is to design new 3D model generators based on Generative Artificial Intelligence (GenAI), capable of producing faithful, coherent and physically viable shapes. While 3D generation has become essential in many fields, current automatic generation approaches suffer from limitations in terms of respecting geometric, structural and physical constraints. The goal is...
-
PostDoc
Multi-Agent Negotiation for Collaborative Resource Placement in Distributed Cloud Networks
This research project aims to design a decentralized and autonomous resource management system for heterogeneous cloud networks. Building on the shift toward distributed architectures driven by concerns over data sovereignty and performance, the project seeks to move beyond the traditional centralized control plane model used in Kubernetes. Each organization involved in a federation of clusters...
-
phD
Bridging the embedding gap between expressive specification and efficient verification of machine learning
Formal verification of neural networks is facing a double-faceted issue. The expressiveness of specifications (as in: compact and close to human understanding) is apparently clashing with their efficient translation to state-of-the-art prover, who only support a fragment of arithmetic without quantifiers. This thesis will investigate quot;globalquot; properties. Such class of properties describe generic behaviours of...
-
Fixed term contract
Ingénieur en Communications réseau déterministes et Jumeau numérique du réseau - CDD - Paris-Saclay F/H
« Rejoignez le CEA pour donner du sens à votre activité, mener et soutenir des projets de R&D nationaux et internationaux, cultiver et faire vivre votre esprit d'innovation. » CE QUE LE CEA VOUS PROPOSE : Le CEA recherche un(e) Ingénieur de Recherche en Réseau / TSN + NDT pour la CEA/DRT (Direction de la Recherche Technologique)....
-
Fixed term contract
Thèse (PhD) : Vulnérabilités des modèles d'IA génératives multimodaux H/F
Bien que l'intelligence artificielle générative excelle dans la création de contenus originaux (comme du texte, image ou code), elle fait face à plusieurs limitations. Les données utilisées pour entrainer les modèles de fondation sur lesquelles s'appuie l'IA générative peuvent être périmées depuis des semaines, des mois, voire des années. De plus, dans un chatbot d'entreprise,...
-
Fixed term contract
Cybersécurité matériel/logiciel des systèmes embarqués H/F
Contexte : L'injection de fautes permet à un attaquant de faire sortir le processeur cible de son comportement attendu. Une perturbation matérielle, via une injection de fautes, vise à induire des modifications logiques au niveau matériel ou logiciel, de manière à ce que le système cible atteigne des états inattendus ou suive des chemins d’exécution...
-
Fixed term contract
Research Engineer in optimization and Design Space Exploration for Next-Generation Computing Systems H/F
IN SUMMARY, WHAT DO WE OFFER YOU? We are looking for an Research Engineer in optimization and Design Space Exploration for Next-Generation Computing Systems. This position in fixed-term contact is based at Nano-Innov (CEA Paris-Saclay), Essonne (91). This position is available as soon as possible. Context Modern computing systems ranging from high-performance computing (HPC) to embedded...
-
Fixed term contract
Apprentissage profond pour applications soutenables H/F
Dans le contexte actuel des changements environnementaux, pour réduire les émissions de gaz à effet de serre comme le CO2, préserver la biodiversité, réduire la pollution, mieux gérer l'eau, etc., la solution n'est pas uniquement technologique. Cependant, cela ne signifie pas que la technologie n'a aucun rôle à jouer. Au contraire, elle peut être un...
-
Fixed term contract
Post-doctorat en deep-learning et soutenabilité F/H
"Rejoignez le CEA pour donner du sens à votre activité, mener ou soutenir des projets de R&D nationaux et internationaux, cultiver et faire vivre votre esprit de curiosité." EN SYNTHESE, QU’EST-CE QUE NOUS VOUS PROPOSONS ? Nous cherchons un(e) ingénieur(e)-chercheur(se) en apprentissage profond pour applications soutenables. Ce poste de cadre en CDD/post-doctorat est basé sur...
-
Internship
Stage en systèmes embarqués pour l'instrumentation nucléaire H/F
Le stage est proposé par l’équipe Imagerie des Rayonnements Ionisants du Laboratoire Capteurs et Instrumentation pour la Mesure. L’imagerie des rayonnements, essentielle dans des domaines tels que la radioprotection, le démantèlement ou les interventions en situations accidentelles, repose sur des détecteurs pixellisés couplés à des semi-conducteurs. Les travaux de stage visent à l’amélioration voir à...
-
Permanent contract
Ingénieur-Chercheur Evaluateur Conformité & SCA H/F
Le laboratoire CESTI est missionné par l’ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information) pour l'évaluation sécuritaire de produits électroniques. Composé actuellement d’environ 30 personnes, évaluateurs en sécurité des TIC de très haut niveau technique, il met en œuvre des bancs de test et techniques d’évaluation à l'état de l'art. Le CESTI Leti a...
-
Fixed term contract
Des LLM pour optimiser la conception en électronique radiofréquence et microélectronique H/F
Le Poste : L'objectif de l'expérimentation est de déployer des outils d'IA générative et d'évaluer leurs apports sur plusieurs cas d'utilisation déjà identifiés. Cette évaluation nécessite d'exploiter des modèles d'IA générative, en particulier de type Large Langage Model (LLM), pour assister les équipes de concepteurs dans leurs activités quotidiennes. Ce poste se focalise tout particulièrement...
-
PostDoc
Secure Implementations of Code-Based Post-Quantum Cryptography: Software-Hardware Co-Design and Side-Channel Resistance
Quantum computing threatens traditional cryptographic schemes like RSA and ECC, prompting the need for post-quantum cryptography (PQC). NIST’s standardization process selected algorithms like HQC, a code-based Key Encapsulation Mechanism. Efficient and secure implementation of these algorithms, especially in resource-constrained environments such as IoT and embedded systems, remains a challenge. Physical attacks, particularly side-channel and fault...