for safe softwares

CODEXA at the service of software cybersecurity

Information security should not be an afterthought, but an integral component from the design stage. I support SMEs and innovative companies in the development and evaluation of secure software and hardware solutions.

My approach is pragmatic, technical, and results-oriented: identifying real risks, strengthening existing systems, and designing robust architectures tailored to your operational constraints. Whether it's securing an application, validating a cryptographic implementation, or testing the resilience of an embedded system, I bring specialized expertise and an independent perspective.

Image d'un laptop avec du code

Services offered

I assist companies in securing their software and hardware systems:

Cadenas

Secure software engineering

Integrating security into the code and architecture from the design stage.
Loupe

Code review

Identification of vulnerabilities and concrete recommendations to correct them.
Clé

Applied cryptography

Implementation and validation of robust cryptographic mechanisms and protocols.
Éclair

Hardware and embedded security

Evaluation of the resilience of embedded systems, particularly against fault attacks.
Software security

Write safe code

A functional application is not necessarily a secure one. Too often, security is added late, after production deployment, when vulnerabilities become costly to fix or when an incident occurs. For an SME or an innovative company, this can mean data leaks, reputational damage, loss of intellectual property, or the blocking of a strategic project.
I work directly with your code and architecture to integrate security by design. This includes, in particular:
  • Implementation of robust authentication and secure session management
  • Proper implementation of access controls and separation of privileges
  • Protection against common application vulnerabilities
  • Validation and sanitation of entries
  • Securing exchanges and sensitive data
I can intervene on an ad-hoc basis on critical modules or participate more broadly in development with a security-oriented approach.
code review

Finding vulnerabilities in the code

Even a skilled team can miss vulnerabilities. Time constraints, increasing system complexity, and constantly evolving threats make an objective assessment of existing code security difficult. Without targeted audits, critical flaws can remain undetected until exploited.
I conduct a thorough analysis of your source code to identify:
  • Exploitable vulnerabilities
  • Poor security practices
  • Cryptographic implementation errors
  • Architectural problems impacting security
You will receive a structured report, prioritized according to risk level, accompanied by concrete and technically actionable recommendations for your teams. The goal is not only to identify problems, but also to enable their effective correction.
applied cryptography

Protect what matters with the right tools

Cryptography is a powerful tool, but extremely sensitive to implementation errors. A poor choice of algorithm, incorrect key management, or a poorly designed protocol can render a theoretically secure system completely vulnerable. These errors are often invisible until they are exploited.
I can help design, implement, or audit cryptographic mechanisms tailored to your needs:
  • Correct implementation of cryptographic primitives
  • Secure integration of existing libraries
  • Design of specific protocols
  • Robustness analysis of an existing structure
  • Secure management of keys and secrets
My goal is to ensure that the cryptography used effectively provides the expected level of security, without any hidden weaknesses.
hardware and embedded security

When the code is secure, check the hardware.

Embedded systems and electronic devices often contain critical secrets: proprietary firmware, cryptographic keys, and authentication mechanisms. Unlike purely software-based systems, they can be physically attacked. Insufficient protection can lead to the extraction of secrets, product cloning, or the bypassing of security mechanisms.
I offer specialized expertise in hardware security assessment, particularly through fault injection attack techniques.
  • The resilience of embedded cryptographic mechanisms
  • The robustness of the protections against the extraction of secrets
  • The system's behavior in response to controlled disturbances
These analyses make it possible to identify vulnerabilities that are difficult to detect through traditional software testing and to strengthen the protection of your intellectual property.
logo de Codexa Perrenoud
Love all, trust a few    - William Shakespeare

PressTVA : CHE-313.683.450RC : CH-550.1.255.647-3Drapeau de pays pour changer de langue

icône représentant un emailpascal@codexa.swissicône représentant un téléphone079/842.16.53Image de boîte aux lettres
Codexa Perrenoud
Av. des Découvertes 3
1400 Yverdon-les-Bains
Suisse
Logo du réseau social LinkedInLinkedIn
Copyright © 2026. Made with ♥ by Web3Templates. Illustrations from Glazestock