About Me
Hello, I’m Abderrahmane, a Cyber Embedded Architect with a Master’s degree in Cybersecurity. I specialize in securing embedded systems from silicon to software — working with ARM TrustZone, Secure Enclaves, and TEE design, backed by hands-on experience with Embedded Linux, Yocto, OpenSSL, and mbedTLS. I architect end-to-end cryptographic solutions leveraging PKCS#11, HSMs, and secure key management to build systems that are trustworthy by design. My drive is simple: make embedded systems resilient against real-world threats.
Experience
Schneider Electric / Meritis (Next-Gen Industrial Automation / IIoT) Cyber Embedded Architect
Cyber Embedded Architect
Avr 2025 - Now
Securing embedded systems is like forging the skeleton of a digital fortress — if the bones are weak, no wall will ever hold.
- Designed and implemented hardware-based security architectures for next-generation PLCs, leveraging NXP i.MX SoCs with EdgeLock Enclave (ELE) as the root of trust for key provisioning, secure boot, and runtime attestation
- Integrated NXP V2X security enclaves into embedded platforms, enabling cryptographic isolation and identity management at the hardware level
- Architected PKCS#11-based key management solutions using TPM and SoftHSM, bridging hardware security modules with application-layer TLS stacks (OpenSSL 3.x provider model)
- Implemented ARM TrustZone / TEE to enforce hardware-enforced isolation between secure and non-secure execution environments on embedded Linux targets
- Contributed to OS/Firmware co-design, analyzing and hardening interactions between the firmware layer and the Linux userspace in Yocto-based embedded systems
- Secured IIoT real-time communication protocols including OPC-UA and Modbus, enforcing mutual TLS authentication, certificate lifecycle management, and secure channel establishment
- Built and maintained Yocto-based BSPs, integrating cryptographic providers, HSM drivers, and security middleware into reproducible embedded Linux distributions
The Verimag Laboratory
Embedded software Security Engineer Researcher
Sep 2022 - Feb 2024
https://www-verimag.imag.fr/
Analyzing code for security is like peering into the DNA of a digital organism to safeguard its health in the cyber ecosystem.
- Countermeasure correctness analysis — formal and semi-formal verification that protections preserve original program behavior under compiler transformations
- Compiler optimization resistance — assessment of countermeasure survival through LLVM optimization passes (O1–O3), ensuring no silent neutralization of security-critical code
- Attack surface evaluation — systematic identification of exploitable code patterns exposed to fault injection and side-channel adversaries
- Attack model adequacy — formal mapping of countermeasures against threat models, verifying coverage and robustness with respect to defined attacker capabilities
- Formal & semi-formal methods — applied abstract interpretation for sound over-approximation of program states, combined with symbolic execution (KLEE) for constraint-based path exploration
- Security assurance alignment — analysis conducted in accordance with Common Criteria evaluation levels (EAL1–EAL7), ensuring countermeasures meet rigorous assurance requirements
- LLVM-level instrumentation — developed C++ analysis passes via the LLVM API for low-level, compiler-aware security auditing
The Verimag Laboratory
PFE Software-Based Fault Injection Countermeasures Analysis
Jan 2022 - Sep 2022
https://www-verimag.imag.fr/
Research: where the curious go to play, the dedicated go to work, and the persistent go to discover
- Physical attack research — fault injection & side-channel (auxiliary channel) attacks on embedded targets
- Attack surface analysis — software protection assessment against hardware-level adversaries
- LLVM-level instrumentation — developed C++ passes via the LLVM API for static binary analysis
- Countermeasure implementation — fault injection mitigations, control flow integrity (CFI) enforcement, and execution path hardening
- Control flow analysis — detection and prevention of CFG hijacking, ROP-chain resistance at compiler level
- Vulnerability assessment — C-level code auditing, data flow analysis & symbolic execution with KLEE
- Path exploration — constraint-based reachability analysis for vulnerability discovery in safety-critical code
- Secure compilation — hardened build pipelines integrating static analysis and countermeasure passes
MERN stack: Uniting the web's building blocks for powerful full stack development
Utilized the MERN (MongoDB, Express.js, React, Node.js) stack to develop the “Help Center” platform.
React: Empowering developers to build dynamic and delightful user interfaces with ease.
Conducted in-depth study on JavaScript frameworks, with a focus on React, for the implementation of visualization models. Executed integration and visualization of JavaScript scripts utilizing Kibana and Elasticsearch.
Projects
Front-End Development for a Java-Like Object-Oriented Language Compiler
github.com/abderrahmane1010/SecureWebAuditCompilers: the only thing that can find 99 problems in 5 seconds.
This project involves designing and implementing the front-end of a compiler for an object-oriented programming language that closely resembles Java. Built using Java, the front-end processes source code by performing lexical analysis, syntax analysis, and semantic checks.
Secure your web app before hackers turn it into their playground.
SecureWebAudit is a web security analysis tool designed to audit HTTP headers and detect XSS (Cross-Site Scripting) vulnerabilities in websites. It aims to provide insights into the security configurations of web headers and identify potential areas where a website may be susceptible to XSS attacks.
ARP: The networking world's version of 'Who's Who.'
ARPRecon is a sophisticated, highly specialized tool designed for monitoring and securing networks against ARP-related vulnerabilities and threats. This tool stands out as a comprehensive solution for network administrators, cybersecurity experts, and anyone concerned with network integrity and security.
Education
Grenoble INP - Ensimag
M2 Cybersecurity
2021 - 2022
National School of Computer Science and Applied Mathematics of Grenoble
Top French educational institution in Informatics, Applied Mathematics and Telecommunications, pioneer in the field of information processing, Ensimag evolves to remain the reference in this field.
Grenoble INP - PHELMA
Embedded systems & Connected objects
2019 - 2022
School of Engineering in Physics, Electronics and Materials Science - Grenoble INP - Phelma
Grenoble INP – Phelma is the school for scientific diversity. It offers its students courses in various fields with a promising future: micro and nano-technologies (micro / nano-electronics, nano-sciences, materials, health, building, etc.), energy…
Preparatory classes - TSI
M2 Cybersecurity
2020 - 2020
TSI (Technologie et Sciences de l'Ingénieur) preparatory class.
Two years in preparatory classes in Mathematics and IEE (Information processing, electrical engineering and electronics).”Classes préparatoires” are two-year intensive preparatory courses in France, aimed at high-achieving students who wish to enter the prestigious grandes écoles—elite higher education institutions.
A Little More About Me
Alongside my interests in networks and software engineering some of my other interests and hobbies are:
- Gymnastics
- Aviron