Jobs
All our offers
-
phD
Code-Reuse Attacks : Automated Exploitation and Defense
Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E). Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to...
-
phD
3D ultrasound imaging using orthogonal row and column addressing of the matrix array for ultrasonic NDT
This thesis is part of the activities of the Digital Instrumentation Department (DIN) in Non-Destructive Testing (NDT), and aims to design a new, fast and advanced 3D ultrasound imaging method using matrix arrays. The aim will be to produce three-dimensional ultrasound images of the internal volume of a structure that may contain defects (e.g. cracks),...
-
phD
High-throughput experimentation applied to battery materials
High throughput screening, which has been used for many years in the pharmaceutical field, is emerging as an effective method for accelerating materials discovery and as a new tool for elucidating composition-structure-functional property relationships. It is based on the rapid combinatorial synthesis of a large number of samples of different compositions, combined with rapid and...