[Idnet] Postdoc position at Inria in IoT Security

Jérôme François <jerome.francois@inria.fr> Mon, 11 March 2019 14:05 UTC

Return-Path: <jerome.francois@inria.fr>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C905124B91 for <idnet@ietfa.amsl.com>; Mon, 11 Mar 2019 07:05:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.92
X-Spam-Level:
X-Spam-Status: No, score=-5.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYcWDkDUPMdV for <idnet@ietfa.amsl.com>; Mon, 11 Mar 2019 07:05:51 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81E101277E7 for <idnet@ietf.org>; Mon, 11 Mar 2019 07:05:50 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.58,468,1544482800"; d="scan'208,217";a="298816051"
Received: from vac26-h01-176-179-156-253.dsl.sta.abo.bbox.fr (HELO [IPv6:2a04:cec0:1144:9a92:7ddf:cb49:46b5:5385]) ([176.179.156.253]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/AES128-SHA; 11 Mar 2019 15:05:47 +0100
From: =?UTF-8?B?SsOpcsO0bWUgRnJhbsOnb2lz?= <jerome.francois@inria.fr>
To: idnet@ietf.org
Message-ID: <8b083248-0edc-b7ff-249f-7dd5fe3c460f@inria.fr>
Date: Mon, 11 Mar 2019 15:03:31 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------B94976BEAF938F6CDFD5A576"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/Wr-VKaeLvhnEgi8RrS2cYcdQg3k>
Subject: [Idnet] Postdoc position at Inria in IoT Security
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2019 14:05:52 -0000

Inria Nancy Grand Est (France) is offering one postdoctoral position in IoT security:
*
Title: *Identifying and Breaking IoT Intrusion Chains*
*
*Summary:

*There is a clear need to automate the security of IoT that can adapt in real-time
to the evolving IoT ecosystem (devices appearing, disappearing, configuration
changes, updates…). All changes may introduce new threats*. *The goal of this
project is to automatically prevent the intrusions by first identifying the
potential intrusion chains. We can thus summarize the global process as follows:
(1) identification of the IoT deployment through topology discovery and
fingerprinting, (2) mapping vulnerability to atomic elements of the IoT deployment
based on public documentations (3) building intrusion chains (4) break intrusion
chains in an optimized manner to limit the impact on the end-users.

*Full description and application:
*https://jobs.inria.fr/public/classic/en/offres/2019-01357

*Application deadline:*
June 5th 2019

*All positions offered by RESIST team:*
https://team.inria.fr/resist/job-offers-2/