$$ \usepackage{amssymb} \newcommand{\N}{\mathbb{N}} \newcommand{\C}{\mathbb{C}} \newcommand{\R}{\mathbb{R}} \newcommand{\Z}{\mathbb{Z}} \newcommand{\ZZ}{\ooalign{Z\cr\hidewidth\kern0.1em\raisebox{-0.5ex}{Z}\hidewidth\cr}} \newcommand{\colim}{\text{colim}} \newcommand{\weaktopo}{\tau_\text{weak}} \newcommand{\strongtopo}{\tau_\text{strong}} \newcommand{\normtopo}{\tau_\text{norm}} \newcommand{\green}[1]{\textcolor{ForestGreen}{#1}} \newcommand{\red}[1]{\textcolor{red}{#1}} \newcommand{\blue}[1]{\textcolor{blue}{#1}} \newcommand{\orange}[1]{\textcolor{orange}{#1}} \newcommand{\tr}{\text{tr}} \newcommand{\id}{\text{id}} \newcommand{\im}{\text{im}\>} \newcommand{\res}{\text{res}} \newcommand{\TopTwo}{\underline{\text{Top}^{(2)}}} \newcommand{\CW}[1]{\underline{#1\text{-CW}}} \newcommand{\ZZ}{% \ooalign{Z\cr\hidewidth\raisebox{-0.5ex}{Z}\hidewidth\cr}% } % specific for this document \newcommand{\cellOne}{\textcolor{green}{1}} \newcommand{\cellTwo}{\textcolor{red}{2}} \newcommand{\cellThree}{\textcolor{brown}{3}} \newcommand{\cellFour}{\textcolor{YellowOrange}{4}} $$

Consultation

Security Audits & Formal Verification

Most high-security systems are not as secure as they seem.

I offer deep-tier security audits for software operating in heavily regulated environments — medical devices, clinical infrastructure, financial systems, and anywhere else where a vulnerability has real-world consequences beyond data loss.

My approach is grounded in mathematics: formal methods, type theory, and rigorous program analysis that goes well beyond automated scanning or penetration testing. I have identified and remediated critical flaws in life-critical systems that conventional audits would have missed.

What I can help with

  • Security audits of regulated or safety-critical software (MDR, IEC 62443, FDA guidance)
  • Formal verification — proving correctness properties of algorithms and protocols
  • Code review with a focus on cryptographic correctness, memory safety, and logic flaws
  • Architecture review for systems where failure has human consequences
  • AI-generated code risk assessment — evaluating the correctness and safety of LLM-produced code in sensitive deployments

Get in touch

Send a brief description of your project and requirements to:

All enquiries are treated as strictly confidential. I typically respond within one business day.