Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Computer systems are increasingly complex and subject to various memory corruption attacks. Defense mechanisms today prevent many traditional attacks, but by manipulating data and code pointers an attacker can still achieve complex attacks goals through techniques such as data-oriented programming. The ARM 8.3-A specification introduced Pointer Authentication that can provide strong integrity checks for pointers. However, program complexity often prevents its fully secure use (e.g., by necessitating reuse of nonces used to generate the associated Pointer Authentication Codes (PACs)). Meanwhile sanitization and spatial memory error detection have forced attacker to more often rely on Use-After-Free (UAF) type errors which are also challenging to prevent without strong PAC nonces.
In this project we will explore alternative instrumentation approaches and PAC nonce schemes that focus on UAF mitigation to retain the high compatibility of simpler PAC schemes while mitigating exploitation of pointers injected via UAF and other means. The practical work will focus on adding new PAC instrumentation to the LLVM compiler, new LLVM static analysis to support the instrumentation, and evaluation of instrumentation effectiveness and performance. From a research perspective we will explore different PAC schemes and evaluate them in terms of security, software compatibility, and static analysis requirements.
If selected, the intern will be working with experienced security experts in the Helsinki System Security Laboratory, and plan, design and implement the work under their guidance. The outcome of the work can be a MSc thesis, but also may include technical reports, research publications and system implementation. If this is a MSc work, we will conduct the project under open IP so that the thesis result can be published in its entirety.
We are looking for:
- A student who has completed most of their MSc courses, in the field of CS/E.Eng.
- System / embedded coding experience in C.
- An understanding of low-level (system / OS) architecture.
- Prior engagement with compiler modification or compiler theory considered a plus.
- Sufficient skills to work and interact in English.
- Good team-working skills.
- Interest to do research and explore new challenges.
- Background (courses) in platform security, compilers, or equivalent.
- An interest to do research and explore new challenges.
The Helsinki Systems Security Laboratory in Huawei Finland (HSSL) drives renewal and mastery in the field of platform / device related security technologies for the mobile device. Our topical expertise lies in hardware-assisted isolation and system protection (hypervisor, TEE, kernel hardening) as well as functions like device key management, attestation and integrity.
Key Skills
Ranked by relevanceReady to apply?
Join Huawei and take your career to the next level!
Application takes less than 5 minutes

