PostDoc position in Verification (Energy Efficient Control)

We are looking to fill a 43 months Postdoctoral Research Associate position on Energy Efficient Control at the University of Liverpool.

https://www.liv.ac.uk/working/jobvacancies/currentvacancies/research/r-588159/

We are seeking an enthusiastic PostDoc to work on the EPSRC project Energy Efficient Control with Sven Schewe and Dominik Wojtczak. The project is in collaboration with Atrenta Inc., a world-leading supplier of innovative software tools addressing early stage IC & system design, and the University of Edinburgh. You will be part of a vibrant team, which also includes a number of PhD students and many international visitors.

You will enjoy developing theories, algorithms, and tools for the evaluation and improvement of the energy efficiency of circuits. The position includes collaboration with our partners, including research visits to Atrenta (Grenoble, France) and Edinburgh.

You should have, or be about to obtain, a PhD in Computer Science or a closely related area together with an excellent track record of international publications in theoretical computer science, software engineering, automata and game theory, and/or tool development. Examples of fields of interests are:

– Verification tools
– Model checking algorithms
– Synthesis
– Evaluation of finite games of infinite duration (e.g., strategy    improvement)
– Relevant AI techniques

Closing date for receipt of applications is Thursday, 23 July 2015 at 5pm BST.

For inquiries, please contact Sven Schewe (sven.schewe@liverpool.ac.uk) or Dominik Wojtczak (d.wojtczak@liverpool.ac.uk).

5 postdoc positions at University of Twente; bring your own topic

The University of Twente has 5 postdoc positions available

We seek
* excellent people with innovative ideas
* who want to work in a truly multi-disciplinary team
* on a common project
* with world-leading scientists
We offer:

* A position in one of the 21 IT-related research groups
* All 5 postdocs work together on the “living smart campus” project
* The positions are not tied to a specific research topic,
* anyone with a PhD and ideas to make life happier, healthier, smarter through IT can apply.

* Excellent research facilities, salary, benefits, sports facilities
* Application deadline: August 16

PhD Position: Schedulable Mixed-critical Multi-core Systems Design

PhD Position:    Schedulable Mixed-critical Multi-core Systems Design

Rigorous System Design team at Verimag research lab in Grenoble is recruiting a PhD student motivated for solving practical research problems of programming many-core systems while satisfying real-time constraints. We consider industrial case studies from avionics and spacecraft domains and target state-of-the-art multi-core platforms.

Though the real-time systems research offers efficient schedulability algorithms, their practical use encounters serious challenges:

1) Lack of consolidation in programming

2) Mixed-criticality

3) Complexity of timing analysis

The first challenge concerns with the lack of formal development techniques for software-intensive systems with real-time constraints. Our work is based on an expressive formal programming and modeling framework BIP, providing refinement, code generation and verification of functional and timing properties for embedded systems. The PhD candidate is expected to develop BIP runtimes and code generation tools for multi-cores, extending our previous work in [1].

The next primary challenge is mixed criticality. The traditional static safety-critical scheduling has to be extended by mixed-critical scheduling, which re-shapes the schedulability analyses in a non-trivial way. The candidate is expected to extend our scheduling algorithms and tools [2] to take into account a set of multi-core platform constraints and evaluate them in different application case studies.

The last but not the least, the conservative timing analysis is a challenging problem, involving two major aspects: the execution time uncertainty in multi-path programs and on cache/bus/network interference between different tasks. The candidate is expected to adapt our statistical model-checking techniques [3] to the analysis of execution times and interferences in real-time multi-core systems.

Our research lab is located in the Grenoble area, one of the world’s most prominent research and technology areas, hosting researchers from all over the world, but also known for its tourism attractions due to nearby spa, ski, alpinism, and other facilities in the heart of the picturesque French Rhône-Alps.

The interested candidates are invited to contact:

Dr. Peter Poplavko, University of Grenoble Alpes:   Peter.Poplavko@imag.fr

Prof. Dr. Saddek Bensalem, University of Grenoble Alpes:  Saddek.Bensalem@imag.fr

References

[1] A Timed-automata based Middleware for Time-critical Multi-core Applications. D. Socci, P. Poplavko, P. Bourgos, S. Bensalem and M. Bozga, In Proc. SEUS 2015.

[2] Multiprocessor Scheduling of Precedence-constrained Mixed-Critical Jobs. D. Socci, P. Poplavko, S. Bensalem, M. Bozga.  In Proc. ISORC-2015.

[3] Building Faithful High-level Models and Performance Evaluation of Manycore Embedded Systems. A. Nouri, M. Bozga, A. Molnos, A. Legay and S. Bensalem. In Proc. MEMOCODE-2014.

Two PostDoc Positions in Software Security

(Apologies for cross-posting)

The chair Modeling and Analysis of Information Systems (MAIS) of Prof. Dr.-Ing. Heiko Mantel in the Department of Computer Science at TU Darmstadt, Germany, is offering two PostDoc positions:
– Concurrent Program Security (detailed position announcement at http://www.mais.informatik.tu-darmstadt.de/assets/misc/2015-PostDoc-IFS-Concurrent.pdf)
– Information-Flow Security by Design (detailed position announcement at http://www.mais.informatik.tu-darmstadt.de/assets/misc/2015-PostDoc-IFS-SecurityEngineering.pdf)

The detailed announcements contain information about the position descriptions, benefits, qualifications, and the application procedure.

The positions are available from September 1st 2015, but a later start is also possible. We will consider applications until the positions are filled.

Questions about the positions can be sent to recruiting@mais.informatik.tu-darmstadt.de. For more information about the chair MAIS, please visit http://www.mais.informatik.tu-darmstadt.de.

3 PhD positions in Information Security at ETH Zurich

The Institute of Information Security headed by Prof. David Basin at
ETH Zurich has three open positions for PhD students on research
projects in the following areas:

– Formal Verification of Secure Networking Systems
– Anonymity of Statistical Data
– Secure Human-Server Interaction

We are looking for enthusiastic outstanding Computer Science or
Mathematics students with a strong background in at least two of the
following topics

– formal methods or mathematical logic,
– probability theory and statistics, and
– information security.

Additionally, experience in the following specialized areas would be
advantageous:

– formal software development by refinement,
– experience with an interactive theorem prover, or
– security protocols.

ETH Zurich regulations require PhD students to hold a Masters or
equivalent degree (e.g., Diplom). All candidates matching the profile
above are encouraged to apply as soon as possible. We will process
applications until all positions are filled. Successful candidates are
expected to start soon after acceptance, but the starting date is
negotiable.

Applications should include:

– a curriculum vitae,
– a brief description of research interests,
– transcripts of grades,
– letters of recommendation from teachers or employers, and,
– if possible, the Master’s or Bachelor’s thesis and publications.

Applications and inquiries should be sent to Sasa Radomirovic at the
following email address.

infsec.positions@inf.ethz.ch

PhD students are paid employees of ETH Zurich. Salary and employment
conditions are attractive. Zurich is a diverse and multicultural city
which is consistently rated among the best cities in the world in
which to live.

Published end of June, 2015

PhD position available, Morpho and Eurecom (FR): Verifiable remote biometric matching

In a verifiable computation system, a client outsources a computation to a third party while keeping the confidence in the result. In the context of biometrics, when data is outsourced to a cloud provider, cloud users can require the cloud to perform some operations over their data. It is of particular interest to rely on new integrity mechanisms which ensure the correct execution of outsourced computations. A malicious or a lazy cloud provider could indeed modify the process to gain some advantages as, for instance, reducing the cost of operating a system. Thus verifiable computation is a tool to enhance the security of a system when parts of the data are outsourced. It will be very helpful for use cases like a mobile client that needs to rely on a cloud provider for authentication decision.

On the one hand, some ad-hoc techniques could be designed for a specific operation, as for instance in [1], that relies on the use of carefully chosen and/or controlled data from the database. On the other hand, recently, generic constructions that become nearly practical have been suggested in the cryptographic community, such as Pepper [2], Pinocchio, Geppeto [3, 4], or Pantry [5], to name a few. Interestingly, a part of these works also enable some kind of confidentiality constraints. For biometric systems, this may allow to deal with secrecy of part of the data or parameters.

The global objective of the PhD proposal is to assess the feasibility of the existing verifiable computation systems, or by adapting them into new solutions, in the context of biometric verification for different use cases.

[1] M. Blanton, Y. Zhang, and K. B. Frikken. Secure and verifiable outsourcing of large-scale biometric computations,  ACM Trans. Inf. Syst. Secur., vol. 16, no. 3, p. 11, 2013.

[2] S. T. V. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes), in 19th Annual Network and Distributed System Security Symposium, NDSS, 2012.

[3] B. Parno, J. Howell, C. Gentry, and M. Raykova. Pinocchio: Nearly practical verifiable computation,  in IEEE Symposium on Security and Privacy, 2013, pp. 238_252.

[4] Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur. Gepetto: Versatile Verifiable Computation, in S&P2015 (36th IEEE Symposium on Security and Privacy, San Jose, California, May 18-20, 2015)

[5] B. Braun, A. J. Feldman, Z. Ren, S. T. V. Setty, A. J. Blumberg, and M. Walfish. Verifying computations with state, in ACM SIGOPS 24th Symposium on Operating Systems Principles, SOSP, 2013, pp. 341_357.

Context:

This PhD will be supervised by two partners under the auspices of the european project TREDISEC starting in 2015: Eurecom for the cryptographic techniques and Morpho for the application to biometric matching and the integration of the findings in an industrial environment.

Location:

The thesis will be located at Morpho’s premises (Issy-Les-Moulineaux, France), with frequent interactions with the other partner (Eurecom, Sophia-Antipolis, France). Participation of the candidate to the life of the project TREDISEC is also required.

Required skills:

The candidate should have a Master’s degree in computer science or a related field. Knowledge and motivation for one of the following fields would be appreciated: security, cryptography, software development.

Knowledge of French is not required.

Supervisor: Refik Molva (Eurecom), Refik.Molva@eurecom.fr

Co-supervisor: Hervé Chabanne (Morpho), herve.chabanne@morpho.com

PhD Position: Schedulable Mixed-critical Multi-core Systems Design

Rigorous System Design team at Verimag research lab in Grenoble is recruiting a PhD student motivated for solving practical research problems of programming many-core systems while satisfying real-time constraints. We consider industrial case studies from avionics and spacecraft domains and target state-of-the-art multi-core platforms.

Though the real-time systems research offers efficient schedulability algorithms, their practical use encounters serious challenges:

  1. Lack of consolidation in programming
  2. Mixed-criticality
  3. Complexity of timing analysis

The first challenge concerns with the lack of formal development techniques for software-intensive systems with real-time constraints. Our work is based on an expressive formal programming and modeling framework BIP, providing refinement, code generation and verification of functional and timing properties for embedded systems. The PhD candidate is expected to develop BIP runtimes and code generation tools for multi-cores, extending our previous work in [1].

The next primary challenge is mixed criticality. The traditional static safety-critical scheduling has to be extended by mixed-critical scheduling, which re-shapes the schedulability analyses in a non-trivial way. The candidate is expected to extend our scheduling algorithms and tools [2] to take into account a set of multi-core platform constraints and evaluate them in different application case studies.

The last but not the least, the conservative timing analysis is a challenging problem, involving two major aspects: the execution time uncertainty in multi-path programs and on cache/bus/network interference between different tasks. The candidate is expected to adapt our statistical model-checking techniques [3] to the analysis of execution times and interferences in real-time multi-core systems.

Our research lab is located in the Grenoble area, one of the world’s most prominent research and technology areas, hosting researchers from all over the world, but also known for its tourism attractions due to nearby spa, ski, alpinism, and other facilities in the heart of the picturesque French Rhône-Alps.

The interested candidates are invited to contact:

Prof. Dr. Saddek Bensalem, University of Grenoble Alpes:  Saddek.Bensalem@imag.fr

Dr. Marius Bozga, CNRS:   Marius.Bozga@imag.fr

References

[1] A Timed-automata based Middleware for Time-critical Multi-core Applications. D. Socci, P. Poplavko, P. Bourgos, S. Bensalem and M. Bozga, In Proc. SEUS‑2015.

[2] Multiprocessor Scheduling of Precedence-constrained Mixed-Critical Jobs. D. Socci, P. Poplavko, S. Bensalem, M. Bozga.  In Proc. ISORC-2015.

[3] Building Faithful High-level Models and Performance Evaluation of Manycore Embedded Systems. A. Nouri, M. Bozga, A. Molnos, A. Legay and S. Bensalem. In Proc. MEMOCODE-2014.

Research Associate (Post-doctoral) in Argumentation Reasoning and Logic Programming for Security

Research Associate (Post-doctoral) in Argumentation Reasoning and Logic Programming for Security

Imperial College London
Department of Computing

Salary range: £33,410 to £42,380 per annum

Full time, fixed term appointment up to 29th July 2017
To start 1st July 2015 or as soon as possible.

Closing Date for applications:  14 June

Full details and how to apply can be found at:

http://academicpositions.co.uk/ad/imperial-college-london/2015/research-associate-post-doctoral-argumentation-reasoning-logic-programming-security/

or

http://www3.imperial.ac.uk/computing/vacancies#ELCOCO15

We are seeking to appoint a post-doctoral research associate to investigate the use of argumentation reasoning and logic programming techniques to the adaptive defence of computer systems against malicious intrusions and the control of information disclosure.  Our group has a number of exciting projects in collaboration with industrial and academic partners with both EU and UK EPSRC funding. The post holder will have primary responsibilities across two projects but will also have the opportunity to contribute more broadly to the activities of the group.

To apply for this position, you will need to have a strong computing or engineering background and a proven track record in research. Knowledge and experience in one or more of the following areas and techniques is required:

Argumentation reasoning
Logic programming with priorities
Policy and enforceable rule-based specifications for security
Analysis techniques for such specifications
Logic-based knowledge representation techniques
Inductive logic programming.
Game theory and applications to security

Should you have any queries regarding the application process please contact Sarah Willis: s.willis@imperial.ac.uk

For details concerning the post please contact Emil Lupu: e.c.lupu@imperial.ac.uk

Call for Ph.D. Students – Cloud Security

The Computer Science department at the University of Auckland seeks 4 Ph.D. Students to join the cloud security team led by Dr. Giovanni Russello.
This research will take place in a new MBIE-funded Cyber Security STRATUS (Security Technologies Returning Accountability, Transparency and User-centric Services to the Cloud) project and will be in collaboration with University of Waikato, UniTech, the Cloud Security Alliance, and several New Zealand-based industrial partners (https://stratus.org.nz). The aim is to research novel yet practical cloud security tools to be adopted by the industry partners.

The research conducted by the University of Auckland’s team will focus on applied cryptography for retrieval and processing of encrypted data in outsourced and untrusted environments. This involves a substantial program of research to develop, implement and apply to industrial case studies.

Applicants are required to have completed (or be close to completing) a Master degree (or equivalent) with outstanding grades in Computer Science, Mathematics, or closely related areas. Additional knowledge in related disciplines such as, e.g., complexity theory or IT security is welcome.
The candidate should be able not only to design but also implement working prototypes of the crypto scheme developed during the research period.

The STRATUS project will provide a stipend of 25,000 NZD p.a. and cover the costs of the tuition fee for 3 years.

Host Institution: The University of Auckland is New Zealand’s leading university. In the 2013 QS survey, the Computer Science Department ranked 38th. The University of Auckland has a strong international focus and is the only New Zealand member of Universitas 21 and the Association of Pacific Rim Universities – international consortia of research-led universities. Auckland is ranked third out of 221 world cities for quality of living in the 2012 Mercer Quality of Living Survey (see www.mercer.com/qualityofliving).

All applications must be submitted online by clicking the Apply Now button on this page: http://careers.uniservices.co.nz/research-development-jobs/research-scientist-ph-d-students-computer-science/229415

Further enquiries about the position should be directed to Dr. Giovanni Russello: g.russello@auckland.ac.nz

3 PhD Studentships in Cyber Security

The PROTECT Research Centre in the School of Computing & Mathematical Sciences at Liverpool John Moores University is pleased to offer at least three PhD studentships in some of the following research areas:Network Security and Forensics, Cloud Privacy and Security, Security in the Internet of Things, Software System/Service Security, and Critical Infrastructure Protection.Further information on the Centre’s research activities can be found at http://www.protect-ci.org/.

A successful applicant should hold or expect to gain at least a good 2.1 Honours or Masters Degree in a Computing related subject, preferably with the knowledge of Cyber Security. Each PhD studentship is for a full-time study over three years. It offers one of the following options: (a) a fully paid tuition fee and a full stipend (currently £13,863), (b) a fully paid tuition fee but a partial stipend, (c) a fully paid tuition fee only, and (d) a partially paid tuition fee only. Which option to offer depends on a successful candidate’s academic track record.

The closing date for applications is the 21st May 2015. An applicant should send a CV and names of two academic referees to Mrs Tricia Watersonby email. For informal enquiries, please contact Dr. Angelos K. Marnerides or Prof. Qi Shi.

Dr. Angelos K. Marnerides

Email:              a.marnerides@ljmu.ac.uk

Tel:                 +44 (0)151 231 2004

Fax:                 +44 (0)151 207 4594

Prof. Qi Shi

Email:              Q.Shi@ljmu.ac.uk

Tel:                 +44 (0)151 231 2272

Fax:                 +44 (0)151 207 4594

Mrs Tricia Waterson

Research Secretary

Email:              T.M.Waterson@ljmu.ac.uk

Tel:                 +44 (0)151 231 2631

Fax:                 +44 (0)151 207 4594

Computer and Information Security – أمن المعلومات