Romain T.

DevOps Manager

Paris, Île-de-France, France7 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in obfuscation techniques for multiple platforms.
  • Experienced educator in reverse engineering and Android security.
  • Developed open-source tools for executable file format manipulation.
Stackforce AI infers this person is a Security Engineer specializing in obfuscation and reverse engineering in the software security domain.

Contact

Skills

Core Skills

ObfuscationAndroid

Other Skills

RASPreverse engineeringmalware analysisFormationDéveloppement de logicielsRétroingénieriereverse-engineering

About

Working on the development of new tools to assist security researchers, I’m also interested in Android, (de)obfuscation and software protections.

Experience

Unknown

2 roles

Senior Security Engineer

Nov 2024Present · 1 yr 5 mos · Paris · Remote

  • Working on obfuscation for the Windows platform
obfuscation

Senior Mobile Security Engineer

Jan 2023Nov 2024 · 1 yr 10 mos · Paris · Remote

  • Working on obfuscation and RASP for Android/iOS
obfuscationRASP

Career break

Personal goal pursuit

Sep 2022Jan 2023 · 4 mos · Paris, Île-de-France

  • Time spent to develop personal projects related to obfuscation, 3D motion graphics, LIEF, and iOS.

Ul solutions

Security Engineer

Sep 2021Sep 2022 · 1 yr · Ville de Paris, Île-de-France, France · Remote

  • Security engineer evaluating the obfuscation and the security of banking apps in the context of EMVCo / PCI-CPoC certifications.
reverse engineeringobfuscation

Quarkslab

5 roles

Android Trainer

Jan 2018Sep 2021 · 3 yrs 8 mos · Région de Paris, France

  • The given training aims to provide keys to analyze Android applications as well as their interactions with the system.
  • This training covers the following topics:
  • Malware analysis
  • Android Runtime and file formats (DEX, ART, OAT, ODEX, VDEX, ELF)
  • IPC and Binder
  • Boot process
  • Securities (dm-verity, SELinux, …)
  • Protections (Obfuscation, packer, anti-debug, …)
malware analysisAndroidobfuscation

Security Engineer

Sep 2016Sep 2021 · 5 yrs · Région de Paris, France

  • Code obfuscation
  • Reverse engineering
  • Android
  • Software protections (Packing...)

Intern

Jan 2016Aug 2016 · 7 mos · Région de Paris, France

  • This internship was about development of LIEF: A library to parse
  • and modify executable file formats. The project has been open-sourced few years later.
obfuscation

Internship at QuarksLab

Promoted

Apr 2015Jul 2015 · 3 mos

  • During this internship, I worked on a compiler code obfuscator
  • • I used LLVM compiler infrastructure.
  • • I developed a code coverage tool based on Trtion
  • • I studied the Obfuscator-LLVM security with Triton
obfuscation

Internship at QuarksLab

Jul 2014Aug 2014 · 1 mo

  • During my internship, I studied the JTAG and how to discover its ports. I used various devices like router, 4G Internet key.
  • • I developed a JTAG testing tool – Available my GitHub page.
  • • I used the Bus Blaster and the JTAGulator with the openOCD library.

Esiea - école d'ingénieur·e·s d'un numérique utile

Teacher

Jan 2018Present · 8 yrs 3 mos · Paris · On-site

  • I'm giving an evening class about executable file formats, how it can be used in reverse engineering and another evening class about Android reverse engineering.
  • These classes are given in the context of the BADGE RE: https://www.esiea.fr/formations/formations-specialisees/badge-reverse-engineering/

Education

ESIEE PARIS

Jan 2011Jan 2017

Polytechnique Montréal

Bachelor's degree — Génie Informatique

Jan 2014Jan 2014

Lycee Maurice Ravel

Baccalauréat — Sciences

Jan 2009Jan 2011

Stackforce found 100+ more professionals with Obfuscation & Android

Explore similar profiles based on matching skills and experience