By continuing to browse the site, you are agreeing to our use of cookies. (More details)
Portal > Offres > Offre UMR6074-ANNHEU-003 - PostDoc sur la classification des logiciels malveillants par le biais d'informations sur les canaux latéraux (H/F)

Research engineer: Malware classification through side-channel information (M/F)

This offer is available in the following languages:
Français - Anglais

Ensure that your candidate profile is correct before applying. Your profile information will be added to the details for each application. In order to increase your visibility on our Careers Portal and allow employers to see your candidate profile, you can upload your CV to our CV library in one click!

Faites connaître cette offre !

General information

Reference : UMR6074-ANNHEU-003
Workplace : RENNES
Date of publication : Wednesday, July 22, 2020
Type of Contract : FTC Scientist
Contract Period : 12 months
Expected date of employment : 1 October 2020
Proportion of work : Full time
Remuneration : about 2600€ brut per month. depending on experience
Desired level of education : PhD
Experience required : 1 to 4 years


While malware detection and mitigation research are now trending, a lot of challenges and unsolved problems still remain. Recently, sophisticated malware designers invented techniques to circumvent software detection techniques. A new direction consists in using unintentionally emitted hardware side-channel information. The big advantage of this information is the non-detection by malware designers. Still, those approaches have to be established in real-world scenarios and efficient analysis techniques developed and implemented.


We are currently building up a realistic IoT malware side-channel analysis platform which gives us first interesting new insights.

Joining our team you will

infect IoT devices with malware samples,
be responsible for the maintenance of the side-channel workbench,
derive and develop efficient implementations of analysis algorithms,
drive top-quality research and publish in A*/A-class security and malware conferences


We are looking for team players who are motivated and able to drive top-quality research. The area of research lies between several fields and we expect at least competences in one of them:

embedded devices/side-channel analysis, and/or
statistics, machine learning, deep learning, and/or
malware analysis.
Additionally, an ideal candidate should have:
* MS degree in a related field, with 1-3 years of work experience,
* good programming skills,
* good level in written and spoken English,
* motivation to save the world.

Work Context

The TAMIS team at IRISA, Inria Rennes - Bretagne Atlantique mainly focuses on vulnerability analysis ranging from software to
hardware attacks, with a strong focus on malware classification and sidechannel analysis

Constraints and risks

The position is initially limited to one year but
can be extended (up to two years) in case of good performance. The starting
date is as soon as possible (given our security clearances).

We talk about it on Twitter!