Intern Program AI security & Cybersecurity
Remote job
NavInfo Europe BV
We harness the power of data and AI to become the digital brain of smart mobility to transform city living & quality of life. Dive into the future with us today.As an intern with the Navinfo Europe Cybersecurity team, you will research and write your master thesis on innovations cybersecurity technologies for Connected cars, IoT, Artificial Intelligence solutions.
You will have the freedom and support of Navinfo Europe to develop your research in one of the fastest-growing business areas of the world. We will give you the opportunity to gain knowledge and skills on a wide range of the most innovative cybersecurity tools, technologies, and methodologies.
You are free to write your own research proposal or choose one of the following suggested areas of research:
1. Penetration testing and reverse engineering of Connected cars and IoT devices.
2. Automated Man-in-the-middle attacks for the mobile network (2G/3G/4G/5G) traffic with software-defined radio (SDR) solutions.
3. Cybersecurity protection for Artificial Intelligence solutions, Deep Neural networks (DNN) models.
Examples of internship projects provided below:
1. Internship project/Master thesis: Automated Man-in-the-middle attacks for 2G/3G/4G/5G mobile networks with SDR solutions.
Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. Even though privacy was a requirement, numerous man-in-the-middle attacks, and network traffic interception techniques were demonstrated at the biggest cybersecurity conferences.
In this research, we will automate mobile traffic interception for different mobile network standards and discover new vulnerabilities in communications protocols. Finally, we will conduct a security analysis of the vulnerability and propose countermeasures to remedy our attacks.
2. Internship project/Master thesis: Penetration testing and reverse engineering of Connected cars and IoT devices.
Connected cars are likely the most complex connected devices we see. The attack surface is immense – the Internet, mobile, Bluetooth, custom RF protocols, DAB, media files imported over USB, remote diagnostics, telematics, mobile apps… As an intern, you will get hands-on experience with penetration testing and software, hardware reverse engineering of modern electric cars and IoT devices:
- Software fuzzing
- Exploit development
- Key fob communication security analyses
- NFC communication security analyses
- CAN bus communication security analyses
- Reverse engineering firmware
- Reverse engineering mobile application
3. Internship project/Master thesis: Improve robustness of digital watermarking DNN models
Comprehensive IP protection of NavInfo Europe models requires robustness of digital watermarking methods against various attacks. Ambiguity attack is one that can be rightfully classified as the most difficult. Ambiguity attack aims to cast doubts on the ownership verification by forging counterfeit watermarks. The ownership is in doubt since both the original and forged watermarks are detected by the verification process. This type of attack poses serious threats to existing DNN watermarking methods. That is why we propose to start the exploration of that topic with a student internship or master thesis project.
4. Master thesis: Coverage-guided penetration testing of DNN models
It is well known that DNN models can be easily offended by adversarial attacks. A DNN model is unsafe if even one adversarial example (mislabeled after minor perturbation) can be found. To prevent enormous financial and reputational risks, a penetration test is required. The test can provide a meaningful indication of model performance and robustness; bug finding and structure analysis. Applying various adversarial attacks by using available toolboxes in an unconstrained way is insufficient. The testing that is done within the guidelines from non-structured coverage metrics is much more promising. Coverage-guided penetration test stays away from exhaustive (endless) testing and indicates test completeness. Several recent papers show potential and development in this direction. While testing, random mutation enhanced with the coverage knowledge, i.e., targeted mutation, is designed to generate test cases. However, the attacks generated by random mutations do not correlate with the published one in the available toolboxes. This significantly reduces the tested space as well as its representativeness of actual attacks on DNN. That is why we propose to start the exploration of that topic with a student master thesis.
5. Internship project/Master thesis: Digital watermarking of proprietary datasets for training DNN models
NavInfo possesses several proprietary and costly datasets that are used to train DNN models. Hidden labeling such data by digital watermarking could prevent financial and reputational risks caused by data leakage or accidental breaches. Dataset watermarking creates imperceptible changes to a dataset such that any model trained on it will carry an identifiable mark. The watermark should be robust to strong variations during the training such as different architectures or optimization methods. One recent paper addressed that problem by embedding a digital watermark successfully. However, that approach is restricted to blind attacks such as architectural or training changes. In an adversarial scenario, the detectability of that carried mark is reduced and attacks, such as evasion attack, can be performed. Therefore, further research is required in that direction. That is why we propose to start the exploration of that topic with a student internship or master thesis project.
6. Master thesis: Improved protection against DNN knowledge stealing
Protecting the confidentiality of DNN models becomes very important nowadays due to the rising popularity of development attacks to steal knowledge via prediction API. These attacks can cause not only IP consequences but also serious performance and reputational consequences. In the second case, an adversary may use a stolen model to find transferable adversarial examples that can evade classification by the original model. Prediction APIs still provide enough information to allow an adversary to mount model extraction attacks by sending repeated queries via the prediction API. Modern stealing attacks do not require a large number of queries to extract the model. On the contrary, they require much fewer queries than iterations during that DNN learning. Recent papers present methods that aimed to protect against knowledge stealing attacks by detection or evasion. However, detection makes strong assumptions on the attack query distribution, which cannot be always guaranteed. Moreover, more popular evasion methods are perturbation-based, hence can affect model prediction accuracy. Therefore, further research is required in that direction. That is why we propose to start the exploration of that topic with a student master thesis project.
Requirements
Education:
- Background in relevant domain (e.g. Cybersecurity, AI, Data Analytics, Data Science, BI or related field)
- Finishing bachelor or Master at university (WO) or Applied Sciences university (HBO) in the Netherlands, Belgium, Germany.
Technical skills:
- Ability to read, interpret and analyze researches
- Writing and presenting. Knowledge about information security (focus on people/ process).
- Able to communicate complexity (verbal and written)
Soft skills:
Ability to work well in an international team environment
Interested?
Does this profile describe you and are you interested in this internship program? Please apply!
You can expect a challenging paid internship with professional guidance. For more information contact the HR department via hrm@navinfo.eu
Tags: Analytics APIs Artificial Intelligence Exploit Pentesting Privacy Reverse engineering Security analysis Vulnerabilities
Perks/benefits: Career development Conferences Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Malware-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs