PhD Position - Trusted computing for identity management and secure data sharing - BENGUERIR

Enseignement - Secteur Autres services

  • Moins de 1 an
  • 1 poste(s) sur Autres régions - Maroc
  • Bac +5 et plus

Recherche de nouveauté Besoin de réflexion Respect des règles Organisation Extraversion

Publiée il y a 19 jours sur ReKrute.com - Postuler avant le 05/12/2021

Entreprise :

Au cœur de la future Ville Verte Mohammed VI à Benguérir, Maroc et située à 30 mn de Marrakech par autoroute ; l’Université Mohammed VI Polytechnique (UM6P), institution d’enseignement supérieur à vocation internationale, est engagée pour un système éducatif basé sur des standards de hauts niveaux en matière d’enseignement et de recherche dans des domaines prioritaires au développement économique du Maroc et de l’Afrique. Notre jeune université construit un réseau académique international de renom et s’appuie sur un corps enseignants-chercheurs disposant d’une longue expérience professionnelle. L’UM6P,  grâce à ses infrastructures de pointe, offre un cadre de de travail, d’étude, et de vie très agréable

Poste :

The Cyber Security and Critical Infrastructure Protection (CyS&CIP) Research Center is the first of its kind in Morocco, and among the two first in Africa. It is a house for interdisciplinary research in cyber security, systems security, and physical systems security.

Attacks on computer systems and networks are on rise. Corporation, governments, and industrials are witnessing an augmentation of ransomwares, a threat to their operations and disruption to the services they provide. Risks incurred by individual, small and medium corporations, as well as industrials and government are higher and higher. The cyber security domains are about the three pillars: prevention, detection, and defense (passive and active). The CyS&CIP research center contributes to the international effort to advance research in cyber security and infrastructure protection and train highly qualified resources.

 

The Vision and ambition of CyS&CIP

  • Lead in Cyber Security and Critical Infrastructure Protection in Morocco, Africa and be among the best in the world.

  • Position UM6P in in the fields at national and regional levels.

  • Advance theoretical and applied research in cyber security and critical infrastructure protection.

  • Train highly qualified personnel in this multidisciplinary domain.

  • Offer research assistance to stakeholders and industrial partners.

  • Foster collaboration between researchers from different institutions, countries, and industrial and government organizations.

  • Engage international community to not leave Africa behind in these critical research areas.

The Mission of CyS&CIP:

  • Advance theoretical and applied research in cyber security and critical infrastructure protection.

  • Explore Interdisciplinary research in cyber security and critical infrastructure protection.

  • Develop and promote excellence in the selected areas of research.

  • Establish strong collaboration with Academia, Industry, Government, and Corporations.

  • Encourage internal and external collaboration.

  • Create new synergies among researchers.

  • Attract and retain outstanding faculty and graduate students.

  • Offer PhD degree and master’s degree programs in interdisciplinary domains.

  • Train students in cutting edge technologies.

 

 

 

Supervisors: Mustapha Hedabou (UM6P), Mohamed Mannan and Amr Youssef (Concordia University)

Identity management in recent years has expand much beyond user-to-device and user-to-server authentication. Each user typically interacts with several devices and multiple enterprises. User-to-device authentication is also often connected to backend services (e.g., account and app data management as in Microsoft Windows, Apple iOS and Google Android). User devices also often authenticate each other, and many home/enterprise IoT devices for data and operational management purposes. Users also authenticate themselves to remote accounts - both for personal use and for work. Some of existing authentication mechanisms rely on trusted hardware - such as Apple security chip, which improves user authentication and device management in a significant way, albeit for Apple devices alone. However, such hardware backed identity management across different vendors (e.g., Apple, Samsung) could benefit far greater number of users. Another significantly unexplored area of research is: how to leverage trusted hardware for enabling data sharing and access control between users and organizations (both directly from user devices and from backend servers). These topic areas can have big impact on the current identity and authentication landscape, and enable more robust and controllable data sharing.

 

References:

https://users.encs.concordia.ca/~mmannan/publications/Safekeeper-main.pdf
https://users.encs.concordia.ca/~mmannan/publications/CKS-secpid2018.pdf
https://users.encs.concordia.ca/~mmannan/publications/Inuksuk-ndss2019.pdf
https://users.encs.concordia.ca/~mmannan/publications/ROIoT-acsac20.pdf
(ARM TrustZone) https://developer.arm.com/ip-products/security-ip/trustzone
(Intel SGX) https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html
(AMD SEV) https://developer.amd.com/sev/
(IntelTXT) https://www.intel.com/content/www/us/en/support/articles/000025873/technologies.html
(Apple Secure Enclave) https://support.apple.com/en-ca/guide/security/sec59b0b31ff/web
(Samsung Knox) https://www.samsungknox.com/en

Profil recherché :

PhD position on Trusted computing for identity management and secure data sharing

Adresse :

Lot 660, Hay Moulay Rachid, Ben Guerir 43150

Traits de personnalité souhaités :

Recherche de nouveauté Besoin de réflexion Respect des règles Organisation Extraversion

Ici, vous pouvez retrouver un taux de recommandation de cette offre pour vous, ainsi que des informations pour mettre en avant votre candidature. Connectez-vous / Inscrivez-vous pour consulter ces informations personnalisées.

ReKrute vous offre ce test de personnalité pour mieux vous connaitre et valoriser vos candidatures. Passez-le dès maintenant, cela ne prend que 5 minutes maximum.