Context: Fault injection allows an attacker to move the target processor out of its expected functioning bounds. A hardware perturbation, by means of a fault injection, aims at inducing logical changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is then leveraged in attacks for leaking secrets, escalating privileges, etc. Recent research has highlighted the need to consider the consequences of fault injection in the processor micro-architecture.
In this area, pre-silicon tools developed by our team [1,2] are able to: 1) identify exploitable vulnerabilities at the software level based on these interactions between a software and a microarchitecture, or 2) formally prove the security, for a given attacker model, of a system embedding hardware/software countermeasures against fault injections. Gobally, these tools implement a methodology that have shown to be successful to find microarchitectural vulnerabilities and/or prove the robustness, for a given fault model, of various RISC-V based processors [3]. For instance, we apply this methodology to the OpenTitan secure element and formally prove the security of its processor’s HW countermeasure to single bit-flip injections [4].
Objectives: Within a national research project promoting the use of pre-silicon tools to validate countermeasures against fault-injection attacks, your main missions will be:
To carry out your mission, you will benefit from a first-class environment at CEA LIST with access to a large number of reference tools and a strong experience in design and analysis of secure systems, in particular against fault-injection attacks and applied formal methods for microarchitectural analyses.
Ref :
[1] µArchiFI : https://github.com/CEA-LIST/uArchiFI
[2] k-FRP : https://github.com/CEA-LIST/Fault-Resistant-Partitioning
[3] S. Tollec et al. μArchiIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023: 101-109
[4] S. Tollec et al.. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 179-204 (2024)
#CEA-List ; #CDD ; #Cyber
You have a PhD or a Engineer’s degree in the field of electronics or embedded systems. You have experience in computer architecture and/or hardware synthesis and/or formal methods for hardware verification. You enjoy working in an applied research environment at the state of the art and proposing innovations and various application areas.
You have acquired the following technical skills
- Knowledge in: computer architecture, programming languages, formal methods, cyber-security;
- Hardware description languages (e.g., Verilog) programming languages (C, C++ and ASM), scripting;
- Excellent written and spoken English;
- Communication and writing skills;
- Teamwork and autonomy.
Location: Saclay (near Paris) or Grenoble
To apply for this position, please send the following documents to the individuals listed above:
- Your CV
- A letter of motivation (in French or English)
- A copy of your Master’s transcript (M1 and M2)
Conformément aux engagements pris par le CEA en faveur de l'intégration des personnes handicapées, cet emploi est ouvert à toutes et à tous. Le CEA propose des aménagements et/ou des possibilités d'organisation pour l'inclusion des travailleurs handicapés
Similar Positions
-
Research Engineer In Spintronics, European Magnetism Association EMA, France, 20 days ago
2025-05-19 | Indefinite contract Lab/Company : Spin Ion Technologies Location : Palaiseau, France Yearly income : >50K€ per year dafine.ravelosona@spin-ion.com File :See details Expiration : 2025...