-
approach is to apply foundational techniques grounded in logic, semantics, and verification. This work takes place within the CYCLIC project: Cyclic Structures in Programs and Proofs, a collaboration among
-
adversarial tampering. Build an open-source software stack that maps algorithms to hardware, including compiler extensions and runtime monitors. Demonstrate your solutions on real-world use cases You will
-
activities. Bad actors use techniques such as phishing to steal personal or otherwise sensitive information. Malware is used to steal data or inflict damage on computer or software systems. Fraudulent webshops
-
and a scientific programmer. You will be supervised by both Rianne de Heide and Jelle Goeman. One PhD student will be appointed at the UT, and one PhD student at the LUMC. We collaborate very closely
-
amplifiers, ultra-low power analog to digital converters, software-defined radio, mixer-first receivers, N-path filters and sub-sampling phase locked loops. The group is a world leader and initiator of many