Bouguern Abderrahmane

Cyber Embedded Architect

About Me

Hello, I’m Abderrahmane, a Cyber Embedded Architect with a Master’s degree in Cybersecurity. I specialize in securing embedded systems from silicon to software — working with ARM TrustZone, Secure Enclaves, and TEE design, backed by hands-on experience with Embedded Linux, Yocto, OpenSSL, and mbedTLS. I architect end-to-end cryptographic solutions leveraging PKCS#11, HSMs, and secure key management to build systems that are trustworthy by design. My drive is simple: make embedded systems resilient against real-world threats.

Experience

Schneider Electric / Meritis (Next-Gen Industrial Automation / IIoT) Cyber Embedded Architect

Cyber Embedded Architect

Avr 2025 - Now

Securing embedded systems is like forging the skeleton of a digital fortress — if the bones are weak, no wall will ever hold.

  • Designed and implemented hardware-based security architectures for next-generation PLCs, leveraging NXP i.MX SoCs with EdgeLock Enclave (ELE) as the root of trust for key provisioning, secure boot, and runtime attestation
  • Integrated NXP V2X security enclaves into embedded platforms, enabling cryptographic isolation and identity management at the hardware level
  • Architected PKCS#11-based key management solutions using TPM and SoftHSM, bridging hardware security modules with application-layer TLS stacks (OpenSSL 3.x provider model)
  • Implemented ARM TrustZone / TEE to enforce hardware-enforced isolation between secure and non-secure execution environments on embedded Linux targets
  • Contributed to OS/Firmware co-design, analyzing and hardening interactions between the firmware layer and the Linux userspace in Yocto-based embedded systems
  • Secured IIoT real-time communication protocols including OPC-UA and Modbus, enforcing mutual TLS authentication, certificate lifecycle management, and secure channel establishment
  • Built and maintained Yocto-based BSPs, integrating cryptographic providers, HSM drivers, and security middleware into reproducible embedded Linux distributions

The Verimag Laboratory

Embedded software Security Engineer Researcher

Sep 2022 - Feb 2024

https://www-verimag.imag.fr/

Analyzing code for security is like peering into the DNA of a digital organism to safeguard its health in the cyber ecosystem.

  • Countermeasure correctness analysis — formal and semi-formal verification that protections preserve original program behavior under compiler transformations
  • Compiler optimization resistance — assessment of countermeasure survival through LLVM optimization passes (O1–O3), ensuring no silent neutralization of security-critical code
  • Attack surface evaluation — systematic identification of exploitable code patterns exposed to fault injection and side-channel adversaries
  • Attack model adequacy — formal mapping of countermeasures against threat models, verifying coverage and robustness with respect to defined attacker capabilities
  • Formal & semi-formal methods — applied abstract interpretation for sound over-approximation of program states, combined with symbolic execution (KLEE) for constraint-based path exploration
  • Security assurance alignment — analysis conducted in accordance with Common Criteria evaluation levels (EAL1–EAL7), ensuring countermeasures meet rigorous assurance requirements
  • LLVM-level instrumentation — developed C++ analysis passes via the LLVM API for low-level, compiler-aware security auditing

The Verimag Laboratory

PFE Software-Based Fault Injection Countermeasures Analysis

Jan 2022 - Sep 2022

https://www-verimag.imag.fr/

Research: where the curious go to play, the dedicated go to work, and the persistent go to discover

  • Physical attack research — fault injection & side-channel (auxiliary channel) attacks on embedded targets
  • Attack surface analysis — software protection assessment against hardware-level adversaries
  • LLVM-level instrumentation — developed C++ passes via the LLVM API for static binary analysis
  • Countermeasure implementation — fault injection mitigations, control flow integrity (CFI) enforcement, and execution path hardening
  • Control flow analysis — detection and prevention of CFG hijacking, ROP-chain resistance at compiler level
  • Vulnerability assessment — C-level code auditing, data flow analysis & symbolic execution with KLEE
  • Path exploration — constraint-based reachability analysis for vulnerability discovery in safety-critical code
  • Secure compilation — hardened build pipelines integrating static analysis and countermeasure passes

Full-Stack Developer - MERN Stack

Jun 2021 - Sep 2021

https://arlynk.com/

MERN stack: Uniting the web's building blocks for powerful full stack development

Utilized the MERN (MongoDB, Express.js, React, Node.js) stack to develop the “Help Center” platform.

Opinaka

Front-End Development

Jun 2020 - Aug 2022

https://home.opinaka.com/home/

React: Empowering developers to build dynamic and delightful user interfaces with ease.

Conducted in-depth study on JavaScript frameworks, with a focus on React, for the implementation of visualization models. Executed integration and visualization of JavaScript scripts utilizing Kibana and Elasticsearch.

Projects

Front-End Development for a Java-Like Object-Oriented Language Compiler

github.com/abderrahmane1010/SecureWebAudit

Compilers: the only thing that can find 99 problems in 5 seconds.

This project involves designing and implementing the front-end of a compiler for an object-oriented programming language that closely resembles Java. Built using Java, the front-end processes source code by performing lexical analysis, syntax analysis, and semantic checks.

Secure your web app before hackers turn it into their playground.

SecureWebAudit is a web security analysis tool designed to audit HTTP headers and detect XSS (Cross-Site Scripting) vulnerabilities in websites. It aims to provide insights into the security configurations of web headers and identify potential areas where a website may be susceptible to XSS attacks.

ARP: The networking world's version of 'Who's Who.'

ARPRecon is a sophisticated, highly specialized tool designed for monitoring and securing networks against ARP-related vulnerabilities and threats. This tool stands out as a comprehensive solution for network administrators, cybersecurity experts, and anyone concerned with network integrity and security.

Education

Grenoble INP - Ensimag

M2 Cybersecurity

2021 - 2022

National School of Computer Science and Applied Mathematics of Grenoble

Top French educational institution in Informatics, Applied Mathematics and Telecommunications, pioneer in the field of information processing, Ensimag evolves to remain the reference in this field.

Grenoble INP - PHELMA

Embedded systems & Connected objects

2019 - 2022

School of Engineering in Physics, Electronics and Materials Science - Grenoble INP - Phelma

Grenoble INP – Phelma is the school for scientific diversity. It offers its students courses in various fields with a promising future: micro and nano-technologies (micro / nano-electronics, nano-sciences, materials, health, building, etc.), energy…

Preparatory classes - TSI

M2 Cybersecurity

2020 - 2020

TSI (Technologie et Sciences de l'Ingénieur) preparatory class.

Two years in preparatory classes in Mathematics and IEE (Information processing, electrical engineering and electronics).”Classes préparatoires” are two-year intensive preparatory courses in France, aimed at high-achieving students who wish to enter the prestigious grandes écoles—elite higher education institutions.

A Little More About Me

Alongside my interests in networks and software engineering some of my other interests and hobbies are:

  • Gymnastics
  • Aviron