Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
The post-doc candidate should have a Ph.D. in cryptography. Experience with FHE is a plus but not a necessity. The Ph.D. candidate should have a master in computer science or in mathematics. Both positions are for three years.
To apply please follow the link below.
Ph.D. student: http://recruitment.uni.lu/en/details.html?nPostingTargetID=5414
University, Germany, has several open positions for postdocs and we are
looking forward to your application.
Our major current research focus is on the recently awarded ERC Synergy
Grant imPACT, which aims at providing foundations for privacy,
accountability, compliance and trust in the Internet of the Future,
including cutting-edge methods and tools for assessing and enhancing
You have the chance to work at one of Europe\'s top sites for IT security
and privacy research, in the beautiful region between Germany, France
and Luxembourg with a high quality of life. Postdocs are paid employees
of Saarland University. Salary and employment conditions are attractive.
We encourage the application of outstanding PhDs in computer science or
IT security, who would like to work with us in the field of next
generation privacy techniques. The positions start from February 1, 2015
or later and are funded for two years, with a possible extension by one
year. We solicit applications by January 15, 2015, but we will consider
applications until the positions are filled. Applications should include a
curriculum vitae, a brief description of research interests, three
selected own publications, and, if available, letters of recommendation.
Applications and informal inquiries should be sent to Michael Backes at
the following email address: application-erc (at) mail-infsec.cs.uni-saarland.de
Center for IT Security, Privacy and Accountability - http://cispa.saarland
Information Security & Cryptography Group -
ERC Synergy Grant imPACT - http://www.impact-erc.eu
come to recognize the merits of building critical systems on top
of small kernels for their ability to provide strong isolation at
system level. This is due to the fact that enforceable isolation is
the prerequisite for any reasonable security policy. Towards this
goal we examine some internals of Fiasco.OC, a microkernel of
the prominent L4 family. Despite its recent success in certain highsecurity
projects for governmental use, we prove that Fiasco.OC
is not suited to ensure strict isolation between components meant
to be separated.
Unfortunately, in addition to the construction of system-wide
denial of service attacks, our identified weaknesses of Fiasco.OC
also allow covert channels across security perimeters with high
bandwidth. We verified our results in a strong affirmative way
through many practical experiments. Indeed, for all potential use
cases of Fiasco.OC we implemented a full-fledged system on its
respective archetypical hardware: Desktop server/workstation on
AMD64 x86 CPU, Tablet on Intel Atom CPU, Smartphone on
ARM Cortex A9 CPU. The measured peak channel capacities
ranging from 13500 bits/s (Cortex-A9 device) to 30500 bits/s
(desktop system) lay bare the feeble meaningfulness of Fiasco.
OC\'s isolation guarantee. This proves that Fiasco.OC cannot
be used as a separation kernel within high-security areas.