Security consulting, product audits and training for teams developing embedded systems and connected products.
Full attack surface coverage: hardware, firmware, communication protocols, web interfaces, cryptography.
Real-world attack simulation: identification and exploitation of vulnerabilities across the full attack surface — embedded, firmware, protocols, web, mobile.
Two engagement modes: black-box (no source access, realistic attacker perspective) or white-box (with source access, exhaustive analysis).
Custom fuzzing platform development. AI applied to vulnerability detection. Detailed report with CVSS scores and remediation recommendations.
Defining a secure architecture before development begins: attack surface mapping, cryptographic primitive selection, design review. Ongoing involvement throughout development is also possible for incremental remediation.
Software security, vulnerability exploitation and cyber awareness training. Adapted to the audience's level, from development teams to non-technical staff. Already delivered at EPITA (Master's level) and MediaTek.
Security can be integrated at every stage of a product's development, from initial design to production release.
Attack surface definition, cryptographic primitive selection, architecture review. Early involvement reduces the cost of remediation significantly.
Code review, vulnerability identification and remediation recommendations sprint by sprint, without impact on the delivery schedule.
Audit or pentest of the product in production-equivalent conditions. Report with CVSS scores, vulnerability classification and remediation recommendations. Team debrief.
Training on common vulnerability patterns: memory corruption, injections, incorrect use of cryptography. Reduces the attack surface structurally over the long term.
Security expert specialising in embedded systems and IoT vulnerability research: manual and AI-assisted code review, fuzzing, across targets ranging from secure boot to TrustZone, firmwares and virtual machines. Following engagements at the French Ministry of Defense and Thales Security Lab, I have been working independently as b0rg since 2024.
MSc in Computer Security & Cryptology, Université de Bordeaux.
b0rg is a sole trader based in Toulouse, France.
For any inquiry, use the address below.
b0rg is spelled with a zero, not an 'o'