I am a Tech Lead specializing in cryptography and hardware security,
with a decade of experience spanning academic research and industry.
My background combines a PhD in software security (deobfuscation, SMT-based
analysis) and postdoctoral research on automated side-channel attack analysis at CNRS/IRISA — including automated analyses for the
IDROMEL project and
ransomware detection research (2021–2023) — with hands-on industry work in
Common Criteria evaluations (EAL4–EAL6+), JavaCard/PKI application security, and embedded systems threat modeling.
My current focus areas:
- Hardware security: side-channel attacks, fault injection, automated offensive analysis on secure elements
- Cryptography: PKI architectures, post-quantum migration, protocol design
- AI-assisted security analysis: threat modeling automation (STRIDE/CWE pipelines)
I write about hardware attacks, cryptography, and security architecture on
Medium.
GitHub ·
LinkedIn ·
Research papers
Updated: April 2026
Tech Lead specializing in cryptography and hardware security.
Updated: April 2026 — inspired by nownownow.com
Work Tech Lead in cryptography and hardware security Common Criteria evaluations (EAL4–EAL6+) on embedded systems Building an AI-assisted threat modeling pipeline (LangGraph + STRIDE + CWE) Preparing CISSP certification Learning Threat modeling frameworks (STRIDE, PASTA) Cloud security architecture (AWS Security Specialty) English — targeting C1 Building Monthly research digest on SCA/FI/PQC Open source tooling for security analysis Living Based in Paris region, planning relocation to Amsterdam Salsa/bachata, fitness, photography
AI-Assisted Threat Modeling Pipeline Work in progress
LangGraph-based orchestration pipeline for automated threat modeling on embedded systems. Decomposes architectures using STRIDE, enriches findings with CWE/CAPEC mappings, and produces structured security reports. Prototype targeting JavaCard/PKI systems.
GitHub — coming soon
Monthly Research Digest — SCA/FI/PQC Ongoing
Curated monthly digest covering latest research in side-channel attacks, fault injection, and post-quantum cryptography migration. Published on Medium.
Open Source Security Tools Planned 2026
Contributions to open source tooling for Common Criteria evidence generation and embedded security analysis.
I write about hardware security, cryptography, and security architecture on Medium.
Content pillars Hardware attacks — Side-channel analysis, fault injection, automated offensive analysis on secure elements CISSP journey — Study notes and exam insights Research watch — Monthly digest on SCA/FI/PQC papers Security architecture — Threat modeling, CC compliance, defensive design informed by offensive research Thought leadership — CRA, supply chain security, AI-assisted vulnerability analysis
My research focused on software protection and automated deobfuscation, specifically, how to automatically break or analyze code that has been deliberately obfuscated to resist reverse engineering. This work sits at the intersection of formal methods (SMT solvers), program analysis, and offensive security, with direct applications to malware analysis and secure software evaluation.
2020 To refine symbolic and concrete deobfuscation of programs protected by opaque predicates, Gonzalvez, A. (2020, June), (Doctoral dissertation, Ecole nationale supérieure Mines-Télécom Atlantique), Rennes, France. ...