Internships 2017

Tue 18 October 2016 by Bruno

This year we have 5 open positions for internships:

  • Python code obfuscation
  • Bootkit TrustZone
  • Malware hunting in Windows kernel
  • Windows privilege escalation
  • Machine Learning for threat intelligence
Duration of internships : 4-6 months
Location : Paris (Issy les Moulineaux)

Internship 1: Python code obfuscation

Description:

The goal of ...

read more

Internships 2015

Fri 24 October 2014 by cedric

This year, we have 4 open positions for internships:

  • Analysis of a virtualization platform
  • Binary instrumentation
  • Bootkit UEFI
  • Indicator Of Compromise (IOC) recovery tool

Internship 1: Analysis of a virtualization platform

Description:

The purpose of this internship is to study a virtualization system currently used in the cloud. The effective ...

read more

Internships 2014

Fri 15 November 2013 by cedric

We have 4 open positions for internships:

  • Assessment of tools detecting APT
  • Binary instrumentation
  • Analysis of a virtualization platform
  • Electronic Control Units (ECU) analysis

Internship 1: Assessment of tools detecting APT

Description:

The first part of the internship consists of analyzing different solutions that detect advanced attacks. Then, based on ...

read more

Internships 2013

Thu 18 October 2012 by chrys

We have 3 open positions for internships:

  • Mobile phone bootloader analysis: this internship aims to evaluate the security of existing bootloaders used in smartphones by developing a bootloader debugger and a USB fuzzer.
  • Bootkit Windows 7: this internship aims to study existing bootkits on Windows 7 but also to develop ...
read more

Internships

Fri 22 October 2010 by fred

We have 4 open positions for internships:

  • Malicious hardware and USB: the purpose is to study the USB protocol and use it on a device (e.g. FPGA) to compromise a target host (Windows, MacOS X, Linux, iOS, Android).
  • Distributed brute force cryptanalysis: the candidate will have to develop a ...
read more

Metasm HowTo: bintrace

Mon 19 July 2010 by alex

Finally, here is the tool we presented at RECON. Our objective is to demonstrate that the use of Metasm allow to quickly and efficiently develop tools, in this particular case we have developed a basic code tracing tool.

bintrace provides few modules: TraceOS, TraceDB, TraceEngine and BranchTraceEngine. They are designed ...

read more

What will we do at HITB Amsterdam?

Tue 08 June 2010 by fred

Sogeti ESEC R&D will be very active at the HITB Amsterdam conference (June 29 - July 2, 2010), and will be giving a training, a lab session and a talk. If you want to meet us there, we can propose some reduction coupons. Please get in touch with us for ...

read more

Séminaire 2010 : compromission de smartphones

Mon 22 February 2010 by gabriel

Les terminaux mobiles sont omniprésents dans notre monde actuel sous diverses formes : GPS, téléphones portables, PDAs, etc. Le smartphone est le résultat de la convergence de toutes ces plateformes. Windows Mobile, est un des systèmes d'exploitation embarqués les plus présents sur le marché mobile. Par conséquent, il parait essentiel ...

read more

Séminaire 2010 : attaques physiques sur un poste utilisateur

Mon 22 February 2010 by gabriel

Accès physique = root : cet adage est connu depuis longtemps dans la communauté de la sécurité informatique. Il est toujours d'actualité : Damien Aumaître a montré au cours de cette présentation comment il est possible de compromettre entièrement la sécurité d'un poste utilisateur en détournant les fonctionnalités offertes aux périphériques ...

read more

Séminaire 2010 : collecte automatisée sur les réseaux sociaux

Mon 22 February 2010 by gabriel

Les réseaux sociaux sont souvent montrés du doigt comme des outils à double tranchant. D'un coté certains disent qu'ils sont indispensables pour tisser et entretenir un réseau relationnel solide alors que d'autres en parlent comme d'un formidable outil de renseignement. Arnauld Mascret et Christophe Devaux nous ...

read more