
From nobody Mon Mar 11 07:05:57 2019
Return-Path: <jerome.francois@inria.fr>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C905124B91 for <idnet@ietfa.amsl.com>; Mon, 11 Mar 2019 07:05:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.92
X-Spam-Level: 
X-Spam-Status: No, score=-5.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYcWDkDUPMdV for <idnet@ietfa.amsl.com>; Mon, 11 Mar 2019 07:05:51 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81E101277E7 for <idnet@ietf.org>; Mon, 11 Mar 2019 07:05:50 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.58,468,1544482800";  d="scan'208,217";a="298816051"
Received: from vac26-h01-176-179-156-253.dsl.sta.abo.bbox.fr (HELO [IPv6:2a04:cec0:1144:9a92:7ddf:cb49:46b5:5385]) ([176.179.156.253]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/AES128-SHA; 11 Mar 2019 15:05:47 +0100
From: =?UTF-8?B?SsOpcsO0bWUgRnJhbsOnb2lz?= <jerome.francois@inria.fr>
To: idnet@ietf.org
Message-ID: <8b083248-0edc-b7ff-249f-7dd5fe3c460f@inria.fr>
Date: Mon, 11 Mar 2019 15:03:31 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------B94976BEAF938F6CDFD5A576"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/Wr-VKaeLvhnEgi8RrS2cYcdQg3k>
Subject: [Idnet] Postdoc position at Inria in IoT Security
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2019 14:05:52 -0000

This is a multi-part message in MIME format.
--------------B94976BEAF938F6CDFD5A576
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Inria Nancy Grand Est (France) is offering one postdoctoral position in IoT security:
*
Title: *Identifying and Breaking IoT Intrusion Chains*
*
*Summary:

*There is a clear need to automate the security of IoT that can adapt in real-time
to the evolving IoT ecosystem (devices appearing, disappearing, configuration
changes, updates…). All changes may introduce new threats*. *The goal of this
project is to automatically prevent the intrusions by first identifying the
potential intrusion chains. We can thus summarize the global process as follows:
(1) identification of the IoT deployment through topology discovery and
fingerprinting, (2) mapping vulnerability to atomic elements of the IoT deployment
based on public documentations (3) building intrusion chains (4) break intrusion
chains in an optimized manner to limit the impact on the end-users.

*Full description and application:
*https://jobs.inria.fr/public/classic/en/offres/2019-01357

*Application deadline:*
June 5th 2019

*All positions offered by RESIST team:*
https://team.inria.fr/resist/job-offers-2/
 

--------------B94976BEAF938F6CDFD5A576
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Inria Nancy Grand Est (France) is offering one postdoctoral position
    in IoT security:<br>
    <span class="h4-inria intitule-detail-offre col-xs-10 col-sm-11"><b><br>
        Title: </b>Identifying and Breaking IoT Intrusion Chains<b><br>
      </b><br>
      <b>Summary:<br>
        <br>
      </b>There is a clear need to automate the security of IoT that can
      adapt in real-time to the evolving IoT ecosystem (devices
      appearing, disappearing, configuration changes, updates…). All
      changes may introduce new threats<b>. </b>The goal of this
      project is to automatically prevent the intrusions by first
      identifying the potential intrusion chains. We can thus summarize
      the global process as follows: (1) identification of the IoT
      deployment through topology discovery and fingerprinting, (2)
      mapping vulnerability to atomic elements of the IoT deployment
      based on public documentations (3) building intrusion chains (4)
      break intrusion chains in an optimized manner to limit the impact
      on the end-users.<br>
      <br>
      <b>Full description and application:<br>
      </b><a class="moz-txt-link-freetext" href="https://jobs.inria.fr/public/classic/en/offres/2019-01357">https://jobs.inria.fr/public/classic/en/offres/2019-01357</a><br>
      <br>
      <b>Application deadline:</b><br>
    </span>June 5th 2019<br>
    <br>
    <b>All positions offered by RESIST team:</b><br>
    <a class="moz-txt-link-freetext" href="https://team.inria.fr/resist/job-offers-2/">https://team.inria.fr/resist/job-offers-2/</a><br>
     <br>
    <span class="h4-inria intitule-detail-offre col-xs-10 col-sm-11"></span>
  </body>
</html>

--------------B94976BEAF938F6CDFD5A576--

