Information security should not be an afterthought, but an integral component from the design stage. I support SMEs and innovative companies in the development and evaluation of secure software and hardware solutions.
My approach is pragmatic, technical, and results-oriented: identifying real risks, strengthening existing systems, and designing robust architectures tailored to your operational constraints. Whether it's securing an application, validating a cryptographic implementation, or testing the resilience of an embedded system, I bring specialized expertise and an independent perspective.
A functional application is not necessarily a secure one. Too often, security is added late, after production deployment, when vulnerabilities become costly to fix or when an incident occurs. For an SME or an innovative company, this can mean data leaks, reputational damage, loss of intellectual property, or the blocking of a strategic project.
I work directly with your code and architecture to integrate security by design. This includes, in particular:
- Implementation of robust authentication and secure session management
- Proper implementation of access controls and separation of privileges
- Protection against common application vulnerabilities
- Validation and sanitation of entries
- Securing exchanges and sensitive data
I can intervene on an ad-hoc basis on critical modules or participate more broadly in development with a security-oriented approach.
Even a skilled team can miss vulnerabilities. Time constraints, increasing system complexity, and constantly evolving threats make an objective assessment of existing code security difficult. Without targeted audits, critical flaws can remain undetected until exploited.
I conduct a thorough analysis of your source code to identify:
- Exploitable vulnerabilities
- Poor security practices
- Cryptographic implementation errors
- Architectural problems impacting security
You will receive a structured report, prioritized according to risk level, accompanied by concrete and technically actionable recommendations for your teams. The goal is not only to identify problems, but also to enable their effective correction.
Cryptography is a powerful tool, but extremely sensitive to implementation errors. A poor choice of algorithm, incorrect key management, or a poorly designed protocol can render a theoretically secure system completely vulnerable. These errors are often invisible until they are exploited.
I can help design, implement, or audit cryptographic mechanisms tailored to your needs:
- Correct implementation of cryptographic primitives
- Secure integration of existing libraries
- Design of specific protocols
- Robustness analysis of an existing structure
- Secure management of keys and secrets
My goal is to ensure that the cryptography used effectively provides the expected level of security, without any hidden weaknesses.
hardware and embedded security
When the code is secure, check the hardware.
Embedded systems and electronic devices often contain critical secrets: proprietary firmware, cryptographic keys, and authentication mechanisms. Unlike purely software-based systems, they can be physically attacked. Insufficient protection can lead to the extraction of secrets, product cloning, or the bypassing of security mechanisms.
I offer specialized expertise in hardware security assessment, particularly through fault injection attack techniques.
- The resilience of embedded cryptographic mechanisms
- The robustness of the protections against the extraction of secrets
- The system's behavior in response to controlled disturbances
These analyses make it possible to identify vulnerabilities that are difficult to detect through traditional software testing and to strengthen the protection of your intellectual property.