Now

Updated: April 2026 — inspired by nownownow.com Work Tech Lead in cryptography and hardware security Common Criteria evaluations (EAL4–EAL6+) on embedded systems Building an AI-assisted threat modeling pipeline (LangGraph + STRIDE + CWE) Preparing CISSP certification Learning Threat modeling frameworks (STRIDE, PASTA) Cloud security architecture (AWS Security Specialty) English — targeting C1 Building Monthly research digest on SCA/FI/PQC Open source tooling for security analysis Living Based in Paris region, planning relocation to Amsterdam Salsa/bachata, fitness, photography

April 26, 2026 · 1 min · Alexandre Gonzalvez

Projects

AI-Assisted Threat Modeling Pipeline Work in progress LangGraph-based orchestration pipeline for automated threat modeling on embedded systems. Decomposes architectures using STRIDE, enriches findings with CWE/CAPEC mappings, and produces structured security reports. Prototype targeting JavaCard/PKI systems. GitHub — coming soon Monthly Research Digest — SCA/FI/PQC Ongoing Curated monthly digest covering latest research in side-channel attacks, fault injection, and post-quantum cryptography migration. Published on Medium. Open Source Security Tools Planned 2026 Contributions to open source tooling for Common Criteria evidence generation and embedded security analysis.

April 26, 2026 · 1 min · Alexandre Gonzalvez

Writing

I write about hardware security, cryptography, and security architecture on Medium. Content pillars Hardware attacks — Side-channel analysis, fault injection, automated offensive analysis on secure elements CISSP journey — Study notes and exam insights Research watch — Monthly digest on SCA/FI/PQC papers Security architecture — Threat modeling, CC compliance, defensive design informed by offensive research Thought leadership — CRA, supply chain security, AI-assisted vulnerability analysis

April 26, 2026 · 1 min · Alexandre Gonzalvez

Publications

My research focused on software protection and automated deobfuscation, specifically, how to automatically break or analyze code that has been deliberately obfuscated to resist reverse engineering. This work sits at the intersection of formal methods (SMT solvers), program analysis, and offensive security, with direct applications to malware analysis and secure software evaluation. 2020 To refine symbolic and concrete deobfuscation of programs protected by opaque predicates, Gonzalvez, A. (2020, June), (Doctoral dissertation, Ecole nationale supérieure Mines-Télécom Atlantique), Rennes, France. ...

October 19, 2021 · 1 min · Alexandre Gonzalvez