From nobody Mon Mar 11 07:05:57 2019 Return-Path: X-Original-To: idnet@ietfa.amsl.com Delivered-To: idnet@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C905124B91 for ; Mon, 11 Mar 2019 07:05:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.92 X-Spam-Level: X-Spam-Status: No, score=-5.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYcWDkDUPMdV for ; Mon, 11 Mar 2019 07:05:51 -0700 (PDT) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81E101277E7 for ; Mon, 11 Mar 2019 07:05:50 -0700 (PDT) X-IronPort-AV: E=Sophos;i="5.58,468,1544482800"; d="scan'208,217";a="298816051" Received: from vac26-h01-176-179-156-253.dsl.sta.abo.bbox.fr (HELO [IPv6:2a04:cec0:1144:9a92:7ddf:cb49:46b5:5385]) ([176.179.156.253]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/AES128-SHA; 11 Mar 2019 15:05:47 +0100 From: =?UTF-8?B?SsOpcsO0bWUgRnJhbsOnb2lz?= To: idnet@ietf.org Message-ID: <8b083248-0edc-b7ff-249f-7dd5fe3c460f@inria.fr> Date: Mon, 11 Mar 2019 15:03:31 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="------------B94976BEAF938F6CDFD5A576" Archived-At: Subject: [Idnet] Postdoc position at Inria in IoT Security X-BeenThere: idnet@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "The IDNet \(Intelligence-Defined Network\) " List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Mar 2019 14:05:52 -0000 This is a multi-part message in MIME format. --------------B94976BEAF938F6CDFD5A576 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Inria Nancy Grand Est (France) is offering one postdoctoral position in IoT security: * Title: *Identifying and Breaking IoT Intrusion Chains* * *Summary: *There is a clear need to automate the security of IoT that can adapt in real-time to the evolving IoT ecosystem (devices appearing, disappearing, configuration changes, updates…). All changes may introduce new threats*. *The goal of this project is to automatically prevent the intrusions by first identifying the potential intrusion chains. We can thus summarize the global process as follows: (1) identification of the IoT deployment through topology discovery and fingerprinting, (2) mapping vulnerability to atomic elements of the IoT deployment based on public documentations (3) building intrusion chains (4) break intrusion chains in an optimized manner to limit the impact on the end-users. *Full description and application: *https://jobs.inria.fr/public/classic/en/offres/2019-01357 *Application deadline:* June 5th 2019 *All positions offered by RESIST team:* https://team.inria.fr/resist/job-offers-2/   --------------B94976BEAF938F6CDFD5A576 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit Inria Nancy Grand Est (France) is offering one postdoctoral position in IoT security:

Title:
Identifying and Breaking IoT Intrusion Chains

Summary:

There is a clear need to automate the security of IoT that can adapt in real-time to the evolving IoT ecosystem (devices appearing, disappearing, configuration changes, updates…). All changes may introduce new threats. The goal of this project is to automatically prevent the intrusions by first identifying the potential intrusion chains. We can thus summarize the global process as follows: (1) identification of the IoT deployment through topology discovery and fingerprinting, (2) mapping vulnerability to atomic elements of the IoT deployment based on public documentations (3) building intrusion chains (4) break intrusion chains in an optimized manner to limit the impact on the end-users.

Full description and application:
https://jobs.inria.fr/public/classic/en/offres/2019-01357

Application deadline:
June 5th 2019

All positions offered by RESIST team:
https://team.inria.fr/resist/job-offers-2/
 
--------------B94976BEAF938F6CDFD5A576--