Jobs

All our offers

+Filter by technology challenge

  • Cyber security : hardware and sofware
  • Energy efficiency for smart buildings, electrical mobility and industrial processes
  • Solar energy for energy transition
  • Green & decarbonated energy including bioprocesses and waste recycling
  • Additive manufacturing, new routes for saving materials
  • Support functions
  • Advanced hydrogen and fuel-cells solutions for energy transition
  • Instrumentation nucléaire et métrologie des rayonnements ionisants
  • Artificial Intelligence & data intelligence
  • New computing paradigms, including quantum
  • Emerging materials and processes for nanotechnologies and microelectronics
  • Advanced nano characterization
  • Photonics, Imaging and displays
  • Communication networks, IOT, radiofrequencies and antennas
  • Smart Energy grids
  • Numerical simulation & modelling
  • Stockage d'énergie électrochimique y compris les batteries pour la transition énergétique
  • Cyber physical systems - sensors and actuators
  • Health and environment technologies, medical devices
  • Factory of the future incl. robotics and non destructive testing

+Filter by contract type

  • Work-study contract
  • Fixed term contract
  • Permanent contract
  • phD
  • PostDoc
  • Internship

+Filter by institute

  • CEA-Leti
  • CEA-List
  • CEA en Région

+Filter by location

  • Grenoble
  • Nantes
  • Paris – Saclay
  • Quimper

+Filter by Level of study

  • Level 4
  • Level 5 / Level 6
  • Level 7
  • Level 8
  • CAP/BEP
Number of results : 22
  • phD Dynamic Assurance Cases for Autonomous Adaptive Systems

    Providing assurances that autonomous systems will operate in a safe and secure manner is a prerequisite for their deployment in mission-critical and safety-critical application domains. Typically, assurances are provided in the form of assurance cases, which are auditable and reasoned arguments that a high-level claim (usually concerning safety or other critical properties) is satisfied given...

    Learn more Apply

  • phD Integrity, availability and confidentiality of embedded AI in post-training stages

    With a strong context of regulation of AI at the European scale, several requirements have been proposed for the quot;cybersecurity of AIquot; and more particularly to increase the security of complex modern AI systems. Indeed, we are experience an impressive development of large models (so-called “Foundation” models) that are deployed at large-scale to be adapted...

    Learn more Apply

  • phD Laser Fault Injection Physical Modelling in FD-SOI technologies: toward security at standard cells level on FD-SOI 10 nm node

    The cybersecurity of our infrastructures is at the very heart in the digital transition on-going, and security must be ensured throughout the entire chain. At the root of trust lies the hardware, integrated circuits providing essential functions for the integrity, confidentiality and availability of processed information. But hardware is vulnerable to physical attacks, and defence...

    Learn more Apply

  • phD Identification versus anonymisation from an embedded client operating on a blockchain

    The first worldwide deployment of a blockchain dates back to 2010 with Bitcoin, which introduced a completely digital monetary system and a crypto-currency, bitcoin. Within Bitcoin, all transactions are publicly accessible and traceable, which should generate trust between stakeholders. However, the traceability of transactions, and ultimately of the crypto-currency, does not imply the traceability of...

    Learn more Apply

  • phD Embedded local blockchain on secure physical devices

    The blockchain is based on a consensus protocol, the aim of which is to share and replicate ordered data between peers in a distributed network. The protocol stack, embedded in the network's peer devices, relies on a proof mechanism that certifies the timestamp and ensures a degree of fairness within the network. The consensus protocols...

    Learn more Apply

  • phD eBeam Probing

    The design of integrated circuits requires, at the end of the chain, circuit editing and failure analysis tools. One of these tools is the probing of electrical potential levels using an electron beam available in a SEM (Scanning Electron Microscope) to determine the electrical signal present in an area of the circuit, which may be...

    Learn more Apply

  • phD Combining over and underapproximation of memory abstractions for low-level code analysis

    Riceapos;s theorem stating that no method can automatically tell whether a property of a program is true or not has led to the separation of verification tools into two groups: sound tools operating by over-approximation, such as abstract interpretation, are able to automatically prove that certain properties are true, but are sometimes unable to conclude...

    Learn more Apply

  • phD Cryptographic security of RISC-V processor enclaves with CHERI

    CHERI (Capability Hardware Enhanced RISC Instructions) is a solution for securing the processor against spatial and temporal memory leaks by transforming any pointer into a capability that clearly defines the access limits to the data or instructions addressed. In this thesis, we propose to enrich CHERI and its control-flow integrity capabilities on a RISC-V application...

    Learn more Apply

  • phD New machine learning methods applied to side-channel attacks

    Products secured by embedded cryptographic mechanisms may be vulnerable to side-channel attacks. Such attacks are based on the observation of some physique quantities measured during the device activity, whose variation may provoke information leakage and lead to a security flaw. Today, such attacks are improved, even in presence of specific countermeasures, by deep learning based...

    Learn more Apply

  • phD HW/SW Contracts for Security Analysis Against Fault Injection Attacks on Open-source Processors

    This thesis focuses on the cybersecurity of embedded systems, particularly the vulnerability of processors and programs to fault injection attacks. These attacks disrupt the normal functioning of systems, allowing attackers to exploit weaknesses to access sensitive information. Although formal methods have been developed to analyze the robustness of systems, they often limit their analyses to...

    Learn more Apply

  • phD Defense of scene analysis models against adversarial attacks

    In many applications, scene analysis modules such as object detection and recognition, or pose recognition, are required. Deep neural networks are nowadays among the most efficient models to perform a large number of vision tasks, sometimes simultaneously in case of multitask learning. However, it has been shown that they are vulnerable to adversarial attacks: Indeed,...

    Learn more Apply

  • phD Acoustics and Electromagnetism (AEM): New approaches for the secure characterization of components such as the SoCs

    Work carried out within CEA-Leti has shown that physical attacks can be a threat to the security mechanisms of SoCs (System on Chips). Indeed, fault injections by electromagnetic disturbance have already led to an escalation of privileges by authenticating with an illegitimate password, or more recently have made it possible to bypass one of the...

    Learn more Apply

  • phD Laser Fault Injection Applied to Reverse Engineering of Memories

    Memories play a critical role for the security of cyber-physical systems. They manage sensitive data such as cryptographic keys and proprietary codes. With the increasing threat of hardware attacks, understanding and manipulating memory organization has become essential. The thesis aims to explore the application of laser attack techniques, specifically Thermal Laser Stimulation (TLS) and laser...

    Learn more Apply

  • phD Secure and Agile Hardware/Software Implementation of new Post-Quantum Cryptography Digital Signature Algorithms

    Cryptography plays a fundamental role in securing modern communication systems by ensuring confidentiality, integrity, and authenticity. Public-key cryptography, in particular, has become indispensable for secure data exchange and authentication processes. However, the advent of quantum computing poses an existential threat to many of the traditional public-key cryptographic algorithms, such as RSA, DSA, and ECC, which...

    Learn more Apply

  • phD Adaptive and explainable Video Anomaly Detection

    Video Anomaly Detection (VAD) aims to automatically identify unusual events in video that deviate from normal patterns. Existing methods often rely on One-Class or Weakly Supervised learning: the former uses only normal data for training, while the latter leverages video-level labels. Recent advances in Vision-Language Models (VLMs) and Large Language Models (LLMs) have improved both...

    Learn more Apply

  • phD Grounding and reasoning over space and time in Vision-Language Models (VLM)

    Recent Vision-Language Models (VLMs) like BLIP, LLaVA, and Qwen-VL have achieved impressive results in multimodal tasks but still face limitations in true spatial and temporal reasoning. Many current benchmarks conflate visual reasoning with general knowledge and involve shallow reasoning tasks. Furthermore, these models often struggle with understanding complex spatial relations and dynamic scenes due to...

    Learn more Apply

  • phD Physics informed deep learning for non-destructive testing

    This PhD project lies within the field of Non-Destructive Testing (NDT), which encompasses a range of techniques used to detect defects in structures (cables, materials, components) without causing any damage. Diagnostics rely on physical measurements (e.g., reflectometry, ultrasound), whose interpretation requires solving inverse problems, which are often ill-posed. Classical approaches based on iterative algorithms are...

    Learn more Apply

  • phD AI Enhanced MBSE framework for joint safety and security analysis of critical systems

    Critical systems must simultaneously meet the requirements of both Safety (preventing unintentional failures that could lead to damage) and Security (protecting against malicious attacks). Traditionally, these two areas are treated separately, whereas they are interdependent: An attack (Security) can trigger a failure (Safety), and a functional flaw can be exploited as an attack vector. MBSE...

    Learn more Apply

  • phD Robust and Secure Federated Learning

    Federated Learning (FL) allows multiple clients to collaboratively train a global model without sharing their raw data. While this decentralized setup is appealing for privacy-sensitive domains like healthcare and finance, it is not inherently secure: model updates can leak private information, and malicious clients can corrupt training. To tackle these challenges, two main strategies are...

    Learn more Apply

  • phD Towards Reliable and Autonomous Workflow Coordination in Agentic AI-Based Systems

    The rise of Large Language Models (LLMs) and agentic AI systems is transforming how complex workflows are designed and managed. Unlike traditional centralized orchestration, modern workflows must support distributed, autonomous agents operating across cloud, edge, and on-premise environments. These agents collaborate with humans and other systems, adapt to evolving goals, and cross organizational and trust...

    Learn more Apply

  • phD GenPhi : 3D Generative AI conditioned by geometry, structure and physics

    The aim of this thesis is to design new 3D model generators based on Generative Artificial Intelligence (GenAI), capable of producing faithful, coherent and physically viable shapes. While 3D generation has become essential in many fields, current automatic generation approaches suffer from limitations in terms of respecting geometric, structural and physical constraints. The goal is...

    Learn more Apply

  • phD Bridging the embedding gap between expressive specification and efficient verification of machine learning

    Formal verification of neural networks is facing a double-faceted issue. The expressiveness of specifications (as in: compact and close to human understanding) is apparently clashing with their efficient translation to state-of-the-art prover, who only support a fragment of arithmetic without quantifiers. This thesis will investigate quot;globalquot; properties. Such class of properties describe generic behaviours of...

    Learn more Apply

en_USEN

Contact us

We will reply as soon as possible...