• EN
  • FR
Site carrière CEA : toutes nos offres d'emploi
CEA

Suivez nous

  •  

  • Accueil
  • Déposer une candidature spontanée
  • Ma recherche, mon alerte
  • CDI/CDD pour alternants/stag. CEA
  • Consulter nos sujets de Thèses
  • Un souci ? Contactez-nous
 

Connexion Espace candidat

J'ai déjà un espace candidat

Connexion à l'espace candidat




Mot de passe perdu

S'inscrire Je me crée un espace candidat

Vous n'avez pas encore votre propre espace candidat. Créez-le en cliquant ici.
Un souci ? Contactez-nous à
admin-poem@cea.fr

 

Vous êtes ici :  Accueil  ›  Liste des offres  ›  Détail de l'offre

Ma sélection : 0 offre(s)
Site carrière CEA : toutes nos offres d'emploi
CEA

Suivez nous

  •  

Menu Site carrière CEA

  • Accueil
  • Déposer une candidature spontanée
  • Ma recherche, mon alerte
  • CDI/CDD pour alternants/stag. CEA
  • Consulter nos sujets de Thèses
  • Un souci ? Contactez-nous
Pause
Lecture
Moteur de recherche d'offres d'emploi CEA
Voir toutes les offres
Flux RSS et autres flux
Information

Design of Fault Injection Models Within Pre-silicon Security Methodologies H/F

  • Envoyer cette offre à un ami
  • Imprimer cette offre (nouvelle fenêtre)
  •  


Vacancy details

General information

CEA (logo)

Organisation

The French Alternative Energies and Atomic Energy Commission (CEA) is a key player in research, development and innovation in four main areas :
• defence and security,
• nuclear energy (fission and fusion),
• technological research for industry,
• fundamental research in the physical sciences and life sciences.

Drawing on its widely acknowledged expertise, and thanks to its 16000 technicians, engineers, researchers and staff, the CEA actively participates in collaborative projects with a large number of academic and industrial partners.

The CEA is established in ten centers spread throughout France
  

Reference

2025-37787  

Position description

Category

Information system

Contract

Internship

Job title

Design of Fault Injection Models Within Pre-silicon Security Methodologies H/F

Subject

Fault-injection attacks exploit hardware perturbations to drive a processor into unexpected states or execution paths, which can leak secrets or enable privilege escalation. Fault-injection attacks are taken into account in the design of high-security products (e.g. debit / credit cards, recent smartphones, etc.). The open-source community is now developing new tools and attack approaches, thus widening the importance of is threat in the cybersecurity community. Recent work has emphasized the importance of accounting for the microarchitectural consequences of such injections. In this context, CEA List have developed pre-silicon tools [1] that have proven effective at discovering microarchitectural vulnerabilities or, for a given fault injection model, formally proving the robustness of several RISC-V processors.


Research units: CEA DRT/LIST/DSCIN/LECA (Palaiseau) & MSE (Gardanne)

Contract duration (months)

6

Job description

µArchiFI [2,3] is one of these pre-silicon tools, it constructs a formal transition system from a Verilog processor description, a binary program, and an attacker model that encodes the fault model. However, the fault models used by µArchiFI do not incorporate layout information. Analyses are performed at the Register Transfer Level (RTL) and can evaluate a wide range of fault models (bit/word set, reset, flip, and symbolic behaviors) on signals selected individually. In a real fault attack scenario, for instance, using a laser source as the fault injection tool, it may hit different bits of the same signal or of different signals.

 


Goals

The internship objective is to enhance µArchiFI with new fault models so that signals that are affected by the laser beam are selected according to laser-spot location regarding the circuit layout. This requires: 1) integrating layout information and location constraints into the fault models, 2) modelling the laser beam’s Gaussian profile to select signals that fall within the beam surface as studied in [4] and illustrated in the Figures at the end of the document. These enhanced fault models will be used to rerun security verifications over processor designs already analyzed by µArchiFI. The obtained results will be compared with state-of-the-art experimental characterizations and against previous results produced by µArchiFI, in particular to benchmark the time it take to perform verification. Additional fault models exploring whether other types of information, such as circuit timing, can be leveraged to capture specific injection means such as clock glitching.

 

 

References

[1] CEA List, Pre-silicon tools for security assessment against fault-injection attacks. https://list.cea.fr/fr/prendre-en-compte-les-vulnerabilites-micro-architecturales-dans-lanalyse-de-robustesse-des-systemes-securises-contre-linjection-de-fautes/
[2] µArchiFI: a pre-silicon tool to assess the robustness of HW/SW systems against fault-injection attacks. Available: https://github.com/CEA-LIST/uArchiFI
[3] Simon Tollec et al. : μArchiFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023.

[4] Standard CAD Tool-Based Method for Simulation of Laser-Induced Faults in Large-Scale Circuits. PhD Raphael Viera, 2018. https://theses.fr/2018MONTS072

 

#CEA-List

Applicant Profile

Profile. This position is aimed at students seeking an ambitious technical internship, eager to gain significant experience in industry-related technological research. It is particularly well-suited to students considering a doctorate, with new funded positions offered each year within the department. The internship is aimed at students in their final year of engineering school (or Master 2) in computer science or microelectronics, or equivalent levels, preferably with a specialization in processor systems/architecture or formal methods.

  •  Knowledge of micro-architecture or cybersecurity is an asset, but not a prerequisite.
  • A strong capacity for personal work, ability to work in a team and motivation to take on technical challenges are essential.
  • Programming capabilities, in particular in C++ and Object-Oriented Programming (OPP)

 

Opportunities.

  • Practical application: work on state-of-the-art pre-silicon tools to assess the security of secure processors against fault-injection attacks and enhance such tools.
  • Technical skills: develop expertise in formal analysis, security verification, and hardware synthesis flows, design of secured processor micro-architectures.
  • Publication: potential to publish results in workshop/conferences on hardware security;
  • Collaboration: work alongside experienced researchers and engineers from CEA 
  • Resources: access to state-of-the-art facilities and infrastructure.

Position location

Site

Saclay

Job location

France, Ile-de-France, Essonne (91)

Location

Saclay

Candidate criteria

Prepared diploma

Bac+5 - Master 2

Requester

Position start date

01/03/2026


Autres offres

Ces offres pourraient vous intéresser

Stage - Simulation de Contrôles Non-Destructifs par ultrasons H/F

Ajouter cette offre à ma sélection : Stage - Simulation de Contrôles Non-Destructifs par ultrasons H/F (2025-37723)
  • Réf. : 2025-37723
  • Stage
  • Essonne (91)
  • Saclay

Stage - Bac+5 - Comportement et mise en œuvre des pièces noyées dans le béton armé - H/F

Ajouter cette offre à ma sélection : Stage - Bac+5 - Comportement et mise en œuvre des pièces noyées dans le béton armé - H/F (2025-37283-S1727)
  • Réf. : 2025-37283-S1727
  • Stage
  • Essonne (91)
  • Bruyères-le-Châtel

Stage - Bac+3 - Mise à niveau d'un référentiel de maintenance - H/F

Ajouter cette offre à ma sélection : Stage - Bac+3 - Mise à niveau d'un référentiel de maintenance - H/F (2025-37402-S1846)
  • Réf. : 2025-37402-S1846
  • Stage
  • Cote d'Or (21)
  • Salives
  • Mentions légales
  • Cookies
  • Paramétrer vos cookies
  • Accessibilité : partiellement conforme
  • Plan du site
Aller en haut