[TYPES/announce] PostDoc/Engineer at UCLouvain in assistive code repair

2019-08-13 Thread Thomas Wilson
[ The Types Forum (announcements only),
 http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]


Apologies for multiple postings...


Universite Catholique de Louvain is seeking to recruit a
PostDoc/Research engineer position in a full time position to work on a
project on assistive code repair. The post is initially offered for one
year, with options to extend for up to three years (project duration is
three years from October 2019).


The main responsibilities of the successful candidate will be to:

1. implement program transformation from source code to a formal model
suitable for analysis,

2. implement and refine analysis techniques to find program flaws, and

3. to automatically generate program repairs for the flaws found.

The post holder will be working closely with researchers within the
group at UCLouvain and industrial partners. The post holder will benefit
from a strong research environment provided at UCLouvain and within the
team. There will also be opportunities to collaborate on other related
projects in the domains of security and verification.


The ideal candidate will hold a PhD or other significant experience in
one or more of the following areas:

- program analysis

- (statistical) model checking

- program verification

- automatic program repair

- programming languages/transformation.


Information enquiries are welcome and should be directed to Dr Thomas
Given-Wilson (thomas.given-wil...@uclouvain.be) or Prof. Axel Legay
(axel.le...@uclouvain.be).


Net salary is 2200-2500 euro per month (after taxes and social security).


Applications should be sent to both Dr Thomas Given-Wilson 
(thomas.given-wil...@uclouvain.be) or Prof. Axel Legay
(axel.le...@uclouvain.be).








signature.asc
Description: OpenPGP digital signature


[TYPES/announce] PostDoc/Research Engineer in IoT Securit at UCLouvain

2019-06-10 Thread Thomas Wilson
[ The Types Forum (announcements only),
 http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]

One year PostDoc/research engineer position to work at Universite
Catholique de Louvain on IoT security. The focus of this project is to
improve IoT security against various forms of attacks such as: fault
injection, side-channel analysis, and through information leakage.
Successful applications should have background and interest in at least
one of the following areas:

- security
- IoT development
- fault injection attacks
- formal methods for program analysis
- verification
- information leakage
- cryptography

The employment is full-time and the salary is between 2300 and 2500 euro
after taxes, social security included. Initial contract offered for 1
year, extensions possible.

The working language is English, French is not required.

Interested candidates should contact Axel Legay (axel.le...@uclouvain.be).




[TYPES/announce] PostDoc/Research Engineer at UCLouvain in resilient cryptography for IoT devices

2018-10-22 Thread Thomas Wilson
[ The Types Forum (announcements only),
 http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]



A one year PostDoc/research engineer position to work at UCLouvain with
Axel Legay and Thomas Given-Wilson. Net salary between 2300 and 2500
euro after taxes, social security included. Note that renewal for a
second year is possible.

Main Competences: Cryptography, software development for IoT devices.

Beneficial Competencies: side-channel analysis, information leakage,
hardware


Starting date: January or February 2019 (flexible)


Project Description
--

Any cryptographic hardware device containing secret data (cryptographic
keys) is vulnerable to an adversary. Hardware
attacks are a very powerful class of attacks which exploit or fault
physical properties of the device. Side-channel attacks
are capable to break cryptographic secrets by capturing additional
physical information while the device is processing
sensitive data. For example, an adversary could monitor the running
time, the cache behaviour, the power
consumption, and/or the electromagnetic radiation of the device.
In order to protect cryptographic secret data against side-channel
attacks, the most investigated countermeasure
is masking that may results in provable security against a certain type
of restricted attacker. Besides that hiding
and shuffling are effective countermeasures in practice which cannot
hinder possible attacks but rather raise their
complexity. However, in practise the most challenging problem is the
upcoming of unexpected leakage information
due to hardware properties. Therefore, while using the mentioned
implementation level countermeasures designers
are able to build “secure" chips (withstanding standard practical
security evaluation processes), it is still not well
understood when certain security levels are reached and which properties
need to hold in practise.
To overcome these limitations, recently, theoretical treatments of
physical attacks have attracted the attention of the
cryptographic community. Instead of preventing any kind of leakage
source, in these works, the
adversary is modelled with abilities of monitoring side-channel
information or inserting faults. These leakage resilient
schemes generally aim to move from the traditional empirical ad-hoc
analysis of the attack towards stronger and more
systematic security arguments or even proofs. Naturally, these more
general approaches suffer from limitations that are
mainly caused by the restriction to particular meaningful adversaries as
it is not feasible to consider an all powerful
physical adversary.


Project Objectives
-

In the new area of the Internet of Things (IoT) billions of connected of
devices will operate in domains that address
wearables, smart homes, automotives, smart cities, the workspace and
industrial applications. Most attention for
IoT has been given on the applications for the home (consumer),
transport (mobility), health (body), buildings
(infrastructure), factory (industrial) and cities (utilities, security).
Many of these (if not all) domains require a reasonable
amount of security and/or privacy protection such as cryptographic
encryption and authentication. In this context,
symmetric cryptographic primitives such as block ciphers are of utmost
importance, because of their low cost and
efficiency on a wide range of platforms. However, these aspects also
makes them a target of choice for physical attackers.
In this project we aim to investigate if leakage resilient
authentication and encryption schemes can be utilised in
the context of IoT where we particularly concentrate on side-channel
attacks using electromagnetic emanation. For
this, we pre-select two state-of-the-art schemes and investigate if
these schemes are suitable for resource restricted IoT
devices and furthermore which requirements have to be met. As a next
step in this project, we will empirically analyse the chosen IoT device
against hardware attacks (use of templates, machine learning, ...).
Furthermore, despite the assumed attacker model of the leakage resilient
schemes,
we will investigate which attacker models are possible in general in the
context of IoT. Using these general attacker
models we determine the security resistance of the investigated schemes
and derive which extra resources are needed
to provide a sufficient security level.
 


How to apply:
--

Contact Axel Legay at axel.le...@uclouvain.be with a CV and, if
possible, a letter of recommendation

 
For more information:
--

Contact Axel Legay at axel.le...@uclouvain.be






signature.asc
Description: OpenPGP digital signature


[TYPES/announce] PostDoc Position at UCLouvain in Formal Verificaion, Privacy, and Security

2018-10-17 Thread Thomas Wilson
[ The Types Forum (announcements only),
 http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]

Hi Everyone,

A two years postdoc scholarship to work at UCLouvain with Axel Legay and
Thomas Given-Wilson. Further details below.

Regards,

- Thomas Given-Wilson


Position:
-

A two years postdoc scholarship to work at UCLouvain with Axel Legay and
Thomas Given-Wilson. Net salary between 2300 and 2500 euro after taxes,
social security included.

Main Competences: Formal verification, privacy, security.

Beneficial Competencies: software development, model checking,
information theory.

Starting date: February 2019 (flexible)


Objective of the Serums project:
--

In order to achieve high quality healthcare provision, it is
increasingly important to collect highly confidential and personal
medical data that has been obtained from a variety of sources, including
personal medical devices and to share this through a variety of means,
including public networks and other systems whose security cannot be
implicitly trusted. Patients rightly expect full privacy, except where
permission has been explicitly given, but they equally expect to be
provided with the best possible medical treatment. Evidence suggests
that integrating home-based healthcare into a holistic treatment plan is
more cost effective, reduces travel-associated risks and costs, and
increases the quality of healthcare provision, by allowing the
incorporation of more frequent home-, work- and environment-based
monitoring and testing into medical diagnostics. There is thus a strong
and urgent demand to deliver better, more efficient and more effective
healthcare solutions that can achieve excellent patient-centric
healthcare provision, while also complying with increasingly strict
regulations on the use and sharing of patient data. This provision needs
to be multi-site, crossing traditional physical and professional
boundaries of hospitals, health centres, home and workplace, and even
national borders. It needs to engage hospitals, medical practitioners,
consultants and other specialists, as well as incorporating
patient-provided data that is produced by personal monitoring devices,
healthcare apps, environmental monitoring etc. This creates huge
pressures. The goal of the Serums project is to put patients at the
centre of future healthcare provision, enhancing their personal care,
and maximising the quality of treatment that they can receive, while
ensuring trust in the security and privacy of their confidential medical
data.

 

UCLouvain's role in the project:
---

The objective of this postdoc position is to develop new security proofs
to ensure correctness of security properties developed in Sérums.

In addition, the postdoc will participate to development of new research
to guarantee privacy of data and evaluate solutions developed by the
consortium.


How to apply:
--

Contact Axel Legay at axel.le...@uclouvain.be with a CV and, if
possible, a letter of recommendation

 
For more information:
--

Contact Axel Legay at axel.le...@uclouvain.be



signature.asc
Description: OpenPGP digital signature