From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 22D147FA8C for ; Mon, 16 Mar 2015 08:33:13 +0100 (CET) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of msteffen@ifi.uio.no) identity=pra; client-ip=129.240.10.15; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="msteffen@ulrik.uio.no"; x-sender="msteffen@ifi.uio.no"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of msteffen@ulrik.uio.no) identity=mailfrom; client-ip=129.240.10.15; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="msteffen@ulrik.uio.no"; x-sender="msteffen@ulrik.uio.no"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-out4.uio.no) identity=helo; client-ip=129.240.10.15; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="msteffen@ulrik.uio.no"; x-sender="postmaster@mail-out4.uio.no"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DXAABOhgZVnA8K8IFbg1haAcICgjmFK4FtTAEBAQEBAREBAQEBAQgLCQkULoRQexoaHUSILw2ZYqpDkyaBFgWUJYIjg1eUFYF0YYE9boEEJIEbAQEB X-IPAS-Result: A0DXAABOhgZVnA8K8IFbg1haAcICgjmFK4FtTAEBAQEBAREBAQEBAQgLCQkULoRQexoaHUSILw2ZYqpDkyaBFgWUJYIjg1eUFYF0YYE9boEEJIEbAQEB X-IronPort-AV: E=Sophos;i="5.11,407,1422918000"; d="scan'208";a="103473635" Received: from mail-out4.uio.no ([129.240.10.15]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA; 16 Mar 2015 08:33:12 +0100 Received: from mail-mx3.uio.no ([129.240.10.44]) by mail-out4.uio.no with esmtp (Exim 4.80.1) (envelope-from ) id 1YXPWR-0006yp-Eq for caml-list@inria.fr; Mon, 16 Mar 2015 08:33:11 +0100 Received: from nittedal.ifi.uio.no ([129.240.70.248]) by mail-mx3.uio.no with esmtp (Exim 4.80) (envelope-from ) id 1YXPWQ-00041m-Pu for caml-list@inria.fr; Mon, 16 Mar 2015 08:33:11 +0100 Received: by nittedal.ifi.uio.no (Postfix, from userid 113721) id BA16690B; Mon, 16 Mar 2015 08:33:10 +0100 (CET) Date: Mon, 16 Mar 2015 08:33:10 +0100 To: caml-list@inria.fr User-Agent: Heirloom mailx 12.4 7/29/08 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: <20150316073310.BA16690B@nittedal.ifi.uio.no> From: msteffen@ifi.uio.no (Martin Steffen) X-UiO-Ratelimit-Test: rcpts/h 12 msgs/h 9 sum rcpts/h 13 sum msgs/h 9 total rcpts 9720 max rcpts/h 76 ratelimit 0 X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, T_RP_MATCHES_RCVD=-0.01,UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO) X-UiO-Scanned: 4B3FE78CB7576784748894ABA0F836DF22284C31 X-UiO-SPAM-Test: remote_host: 129.240.70.248 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 9 total 3627 max/h 71 blacklist 0 greylist 0 ratelimit 0 X-Validation-by: msteffen@ifi.uio.no Subject: [Caml-list] 2 Ph.D positions available (in Formal Methods for Security Analysis / Concurrent Systems), U. of Oslo 2 Ph.D positions in computer science available at the Department of Informatics, University of Oslo. Topics: 1) Formal analysis techniques for concurrent programs 2) Formal methods for security analysis o Qualifications The appplicant is required to hold a Master's degree or equivalent in computer science and should have good analytical and programming skills. The ideal candidate has background in (some of) the following areas of formal methods and analysis: software verification, validation, and testing, static analysis, semantics, concurrency theory (especially for position 1), computer security and its analysis (especially for position 2), including knowledge of tools in that field. Besides technical skills, we are looking for a curious, ambitious candidate who is highly motivated to do research and contribute to the work done at our group. Good communication skills in both oral and written English are expected. o Research groups: The 2 Ph.D positions is embedded in the group Precise Modeling and Analysis of Dependable Systems (PMA) at the Department of Informatics, University of Oslo resp. is a part of the Conserns Strategic Research Initiative on Concurrent Security and Robustness for Networked Systems: - http://www.mn.uio.no/ifi/english/research/groups/pma - http://www.mn.uio.no/ifi/english/research/groups/conserns o For more detailed information about how to apply, formal application requirements, terms of employment etc., cf. the 2 webpages: - http://uio.easycruit.com/vacancy/1352893/64290?iso=no - http://uio.easycruit.com/vacancy/1352821/64290?iso=no o Contact: - Martin Steffen (msteffen@ifi.uio.no) - Einar Broch Johnsen (einarj@ifi.uio.no) - Audun Josang (audun.josang@mn.uio.no) o More details on the intended area of resarch of the two positions: 1) Analysis techniques for concurrent systems: The candidate is expected to work on program analysis and modelling techniques to ensure robust and predictable program execution, such as e.g., extended type systems, monitoring and run-time verification and combinations of static an dynamic techniques. Properties we are interested in are mostly non-functional such as resource-consumption (time, memory and similar) and also security-aspects. Target application domains are concurrent programs intended to run on variable platforms (such as on different cloud providers or in different multi-core architectures) and the analysis methods being develop are intended to make informed and ideally automated decisions on how to deploy, (re-)configure, or parallelize applications. 2) Security analysis The Ph.D topic is in formal methods and tools for analyzing security properties in concurrent and distributed programs. The goal of this PhD scholarship is to address the problem of how IT systems during runtime can assess, detect, react and adapt to current security threats, vulnerabilities and attacks in order to achieve a certain level of security threat immunity. Elements to be considered as part of this PhD project is the development of models for dynamic risk, the design of redundant security architectures, and the application of formal methods for security design verification.