About Papers Projects Experience Contact Download CV
Firmware Fuzzing Engineer Embedded Security · Side-Channel Analysis · Vulnerability Research

Jorge Barredo
Ferreira

Embedded/Firmware Software Security Engineer  ·  PhD in Industrial Cybersecurity

I am a security engineer with a PhD in Industrial Cybersecurity and a track record across embedded systems, 5G networks, industrial protocols, and high-performance computing. I enjoy working at the boundary between hardware and software — finding vulnerabilities that conventional tools miss, building the infrastructure to reproduce them, and understanding why they exist at the hardware level. I also have a genuine interest in AI and LLMs, which I have applied to learning analytics, fuzzing seed generation, and vulnerability triage. Research stay at University College London.

Firmware FuzzingAFL++ libFuzzerFirm-AFL · QEMU Test HarnessCrash Triage Corpus ManagementASan · UBSan · MSan Side-Channel AnalysisEM · Power · Timing IoT SecurityVulnerability Research Embedded SystemsARM · STM32 C · C++ · PythonGhidra Docker · CI/CDIEC 62443 5G Core SecurityProtocol TestingFPGA AI & LLMs Machine Learning
Jorge Barredo Ferreira

About

Background

I am an Embedded/Firmware Software Security Engineer with a PhD in Industrial Cybersecurity (Mondragon Unibertsitatea, cum laude). I work at the intersection of software testing and hardware observability — building systems that find vulnerabilities in firmware before they reach production.

My PhD was carried out at IKERLAN Technology Research Centre, producing four frameworks — CARNYX, GJALLARHORN, GAFLERNA, and TRENTI — that integrate power, electromagnetic, and timing side-channel signals into fuzzing campaigns without source code access. I did a research stay at University College London as visiting PhD researcher in the SOLAR Group, collaborating with Prof. Justyna Petke and Prof. David Clark.

Before my PhD I worked at Ericsson on 5G core security and cloud-native service mesh hardening, at DNV on protocol conformance testing for energy and telecom devices, and at Barcelona Supercomputing Center on FPGA acceleration for graph workloads.

I hold two MSc degrees from Universidad Carlos III de Madrid — Cybersecurity and Telecommunication Engineering — and a BSc in Telecommunication Technologies from Universidad de Cantabria (Honours thesis, 10/10).

Beyond security, I have a genuine interest in AI and large language models — I have used them to generate fuzzing seeds for critical infrastructure software (published at CRITIS 2025), to build learning analytics tools, and for automated vulnerability triage. I find the intersection of AI and security one of the most exciting research directions today.

5
Publications
4
Research Projects
MSc Degrees
🏆
Young CRITIS Award 2nd

Papers

Published Papers

2025
Int. J. Information Security · Springer · Vol. 24 No. 4
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Jorge Barredo, Maialen Eceiza, Jose Luis Flores, Mikel Iturbe
DOI ↗ PDF ↗
@article{Barredo2025Carnyx,
  title   = {CARNYX: A framework for vulnerability detection via
             power consumption analysis in embedded systems},
  author  = {Barredo, Jorge and Eceiza, Maialen and
             Flores, {Jose Luis} and Iturbe, Mikel},
  journal = {International Journal of Information Security},
  volume  = {24},
  number  = {4},
  pages   = {172},
  year    = {2025},
  issn    = {1615-5270},
  doi     = {10.1007/s10207-025-01092-2}
}
2025
Computers & Security · Elsevier · Oct 2025
GJALLARHORN: A framework for vulnerability detection via electromagnetic side-channel analysis in embedded systems
Jorge Barredo, Maialen Eceiza, Jose Luis Flores, Mikel Iturbe
DOI ↗
@article{Barredo2025Gjallarhorn,
  title   = {GJALLARHORN: A framework for vulnerability detection via
             electromagnetic side-channel analysis in embedded systems},
  author  = {Barredo, Jorge and Eceiza, Maialen and
             Flores, {Jose Luis} and Iturbe, Mikel},
  journal = {Computers & Security},
  pages   = {104692},
  year    = {2025},
  issn    = {0167-4048},
  doi     = {10.1016/j.cose.2025.104692}
}
2025
ACM FSE 2025 · Trondheim, Norway · pp. 550–554
GAFLERNA Ahoy! Integrating EM Side-Channel Analysis into Traditional Fuzzing Workflows
Jorge Barredo, Justyna Petke, David Clark, Dan Blackwell, Maialen Eceiza, Jose Luis Flores, Mikel Iturbe
DOI ↗ PDF ↗
@inproceedings{Barredo2025Gaflerna,
  title     = {{GAFLERNA} {Ahoy!} Integrating {EM} Side-Channel
               Analysis into Traditional Fuzzing Workflows},
  author    = {Barredo, Jorge and Petke, Justyna and Clark, David
               and Blackwell, Dan and Eceiza, Maialen and
               Flores, {Jose Luis} and Iturbe, Mikel},
  booktitle = {Proceedings of the 33rd {ACM} International
               Conference on the Foundations of Software Engineering},
  series    = {{FSE} Companion '25},
  pages     = {550--554},
  year      = {2025},
  isbn      = {9798400712760},
  location  = {Trondheim, Norway},
  publisher = {Association for Computing Machinery},
  doi       = {10.1145/3696630.3728497}
}
2025
CRITIS 2025 · Jönköping, Sweden · Springer (in press)
Sow Smarter, Not Harder: Evaluating LLM-generated Seeds for Fuzzing Critical Infrastructure
Jorge Barredo, Maialen Eceiza, Jose Luis Flores, Mikel Iturbe
🥈 2nd Place · Young CRITIS Award 2025
@inproceedings{Barredo2025Sow,
  title     = {Sow Smarter, Not Harder: Evaluating {LLM}-generated
               Seeds for Fuzzing Critical Infrastructure},
  author    = {Barredo, Jorge and Eceiza, Maialen and
               Flores, {Jose Luis} and Iturbe, Mikel},
  booktitle = {Proceedings of the 20th International Conference on
               Critical Information Infrastructures Security
               ({CRITIS} 2025)},
  year      = {2025},
  month     = oct,
  location  = {J\"onk\"oping, Sweden},
  publisher = {Springer}
}
2023
EC-TEL 2023 · Springer LNCS vol. 14200 · pp. 736–741
Statoodle: A Learning Analytics Tool to Analyze Moodle Students' Actions and Prevent Cheating
Pedro M. Moreno-Marcos, Jorge Barredo, Pedro J. Muñoz-Merino, Carlos Delgado Kloos
@inproceedings{MorenoMarcos2023Statoodle,
  title     = {Statoodle: A Learning Analytics Tool to Analyze
               {Moodle} Students' Actions and Prevent Cheating},
  author    = {Moreno-Marcos, Pedro Manuel and Barredo, Jorge and
               Mu{\~n}oz-Merino, Pedro J. and Delgado Kloos, Carlos},
  booktitle = {Responsive and Sustainable Educational Futures:
               18th European Conference on Technology Enhanced Learning,
               {EC-TEL} 2023},
  series    = {Lecture Notes in Computer Science},
  volume    = {14200},
  pages     = {736--741},
  year      = {2023},
  isbn      = {978-3-031-42681-0},
  location  = {Aveiro, Portugal},
  publisher = {Springer-Verlag},
  doi       = {10.1007/978-3-031-42682-7_70}
}

Projects

Research & Projects

TRENTI

Multimodal in-loop side-channel feedback for embedded fuzzing — simultaneous EM, power, and timing signals feeding AFL++ via Firm-AFL/QEMU under full black-box conditions.

MULTIMODAL FEEDBACK — TRENTI EM PWR TIME signal fusion AFL++ Firm-AFL/QEMU in-loop hardware feedback Black-box firmware · No source · No instrumentation Embedded Linux (Firm-AFL/QEMU) + bare-metal targets Cross-modal triangulation → automated vulnerability triage
In Submission Repository not yet public

TRENTI addresses a fundamental limitation of firmware fuzzing: when no source is available and the target runs on real hardware or emulation, standard coverage signals become unreliable. TRENTI closes this by simultaneously capturing EM, power, and timing signals during a campaign, feeding them back to AFL++ as composite hardware-level coverage.

The framework integrates with Firm-AFL/QEMU for full-system emulation and falls back to direct hardware measurement for bare-metal. A custom feedback bridge translates physical signal deviations — detected via HDBSCAN on EM traces — into edge discovery events guiding AFL++ mutation. Cross-modal triangulation diagnoses anomalies without decompilation.

GAFLERNA

First integration of live EM side-channel analysis as an in-loop oracle in AFL++ for IoT firmware — no target modification, no source code, no recompilation.

AFL++ + EM ORACLE PIPELINE Firmware STM32 EM Probe SDR HDBSCAN classifier AFL++ mutator hardware feedback loop 87% sanitizer correlation no binary mod 104 new crash paths 4 real-world programs ACM FSE 2025 Trondheim, Norway 0 mods to target binary source-free · black-box
ACM FSE 2025 DOI ↗ PDF ↗ Repository not yet public

GAFLERNA treats the device's electromagnetic field as a real-time anomaly detector. During each AFL++ execution, a near-field probe and SDR record an EM trace, classified by a pre-trained HDBSCAN model. Anomalous traces trigger a virtual crash to AFL++ — preserving the input in the crash corpus without touching the binary or requiring debug symbols.

Sanitizer Correlation
87%
Best-case vs ASan — zero binary changes
New Crash Paths
104
Undiscovered paths — 4 real-world programs
Source Required
None
Black-box · no recompilation · no symbols

Evaluated on four programs compiled for STM32, validated against ground-truth ASan findings. Outperforms prior EM monitoring approaches that required labelled datasets — GAFLERNA operates entirely unsupervised, in-loop.

GJALLARHORN

Automated EM side-channel measurement framework classifying 16 firmware vulnerability types non-invasively — validated on STM32 and Raspberry Pi, without source code or debug interfaces.

EM SPECTRUM — NUCLEO-144 anomalous signature 95.94% recall — STM32 NUCLEO-144 73.33% recall — Raspberry Pi 3B 16 vulnerability classes memory · arithmetic · null-ptr · overflow non-invasive · no debug interface
Computers & Security 2025 DOI ↗ GitHub ↗

GJALLARHORN asks: can we detect that firmware contains a vulnerability simply by observing EM emissions, without triggering the bug? The answer is yes — for a broad class of memory and arithmetic flaws. The framework automates trace acquisition, signal conditioning, time-frequency decomposition, and multi-class ML classification, distinguishing 16 distinct vulnerability categories.

Recall — STM32 NUCLEO-144
95.94%
F₁ 96.39% — ARM Cortex-M4
Recall — Raspberry Pi 3B
73.33%
F₁ 84.61% — ARM Cortex-A53, Linux
Vulnerability Classes
16
Categorised — not just anomaly/normal

Key insight: different flaw types produce characteristic EM signatures. Buffer overflows generate irregular DRAM bursts; divide-by-zero creates truncated traces; memory leaks manifest as monotonically growing heap traffic.

CARNYX

Power side-channel analysis framework for pre-deployment vulnerability detection — classifying 16 flaw classes across three hardware platforms, up to 99.69% recall, no source code required.

POWER TRACE — STM32F4 overflow overflow HDBSCAN E0202 E0101 nominal 99.69% recall — Riscure Piñata 16 flaw classes no source code · no recompilation
Int. J. Information Security 2025 DOI ↗ PDF ↗ GitHub ↗

CARNYX establishes the series' core methodology: classify which type of software vulnerability is present in running firmware using only its power consumption signature — before any crash occurs. A current probe on the supply rail, no firmware modification. An unsupervised HDBSCAN model builds a behavioural baseline; new traces are compared to detect and categorise deviations across 16 distinct flaw categories.

Riscure Piñata (STM32F4)
99.69%
Recall — high-SNR security eval board
NUCLEO-144 · Serial
86.88%
Recall — standard dev board
NUCLEO-144 · Ethernet
51.25%
Peripheral noise impact — first quantification
BeagleBone Black
53.67%
ARM Cortex-A8 · Linux OS noise

First to quantify how peripheral selection affects SCA leakage quality — a previously underexplored variable. Results directly inform attack surface prioritisation in firmware security assessments.

Statoodle

Learning analytics platform extending Moodle — quiz performance reports, item difficulty estimates, structured Excel outputs from activity logs, and a behavioural warning layer for online assessments.

STATOODLE — MOODLE ANALYTICS QUIZ DIFFICULTY INDEX 0.87 0.62 0.91 0.31 ⚠ 0.95 ACTIVITY LOG HEATMAP ⚠ suspicious EC-TEL 2023 Presented at 18th European Conference on Technology Enhanced Learning Free MOOC available · Strong uptake across Spanish universities lnkd.in/egMFtbKh · MOOC (Ruth Cobos Pérez et al.)

Built during my Master's years guided by a simple principle: technology matters when it solves real needs. Statoodle helps instructors make practical use of Moodle data — turning exported reports and logs into actionable teaching information without requiring programming skills.

Presented at EC-TEL 2023 by my colleague Pedro Moreno-Marcos. A free MOOC by Ruth Cobos Pérez, Pedro, Antonio Balderas, Miguel Ángel Conde González, and Manuel Freire has since spread the tool across Spanish universities, with strong uptake in the education community. If you're a Moodle instructor, I encourage you to try the free MOOC.


Experience

Work & Education

Work
Nov 2022 – Jan 2026
Embedded Security Research Engineer (PhD)

Designed and operated firmware fuzzing pipelines. Developed harnesses, managed corpora with LLM seed generation, triaged crashes with sanitizers and gdb. Integrated EM/power/timing SCA feedback for attack surface prioritisation. Containerised with Docker for CI; aligned with IEC 62443.

AFL++libFuzzerFirm-AFL/QEMUHarnessingCorpus MgmtASan/UBSan/MSangdbCrash TriageEM/Power/Timing SCAHDBSCANPythonC/C++DockerCI/CDIEC 62443STM32Ghidra
Sep – Dec 2024
Visiting PhD Researcher

International PhD mention. Extended fuzzing with live EM SCA integration — direct output: GAFLERNA at ACM FSE 2025. Worked with Prof. Justyna Petke and Prof. David Clark.

EM SCAAFL++SDRSignal Processing
May – Oct 2022
Protocol Testing Consultant

Protocol conformance and interoperability testing for energy/telecom devices (DLMS). Reproducible HW/SW testbeds and Python automation for IEC/ISO certification.

DLMSProtocol TestingPythonIEC/ISOEnergy Sector
Jun 2021 – Feb 2022
R&D Software Developer Trainee

5G core security mechanisms in C/C++ and Python. Configured mTLS and validated Istio sidecar injection in Docker/Kubernetes cloud-native deployments.

5G CoreC/C++mTLSIstioKubernetesDocker
Jul – Aug 2019
Undergraduate Research Fellow

FPGA-oriented HW/SW co-design for graph workloads. Bachelor thesis: Accelerating PageRank with ZCU102-ES2 FPGA (10/10, Honours).

FPGAHW/SW Co-designC/C++Xilinx/Vivado
Education
2022 – 2026
PhD in Industrial Cybersecurity — cum laude · International Doctorate Mention

Novel Techniques for Embedded Fuzzing with Side-Channel Analysis and Seed Optimisation. Frameworks: CARNYX, GJALLARHORN, GAFLERNA, TRENTI. Supervised by Dr. Maialen Eceiza and Dr. Mikel Iturbe. International doctorate mention awarded for research stay at UCL.

FuzzingSCAEmbedded SecurityLLMsIoT
2021 – 2022
MSc in Cybersecurity (English) — 9.7/10

Thesis: Protocol for Avoiding Negotiation Reset due to Eavesdropping in Quantum Key Distribution. Proposed a protocol improvement for QKD networks that prevents negotiation session resets caused by passive eavesdropping — a vulnerability in BB84-based implementations that can disrupt key exchange without triggering standard intrusion detection.

CryptographyQKDNetwork Security
2020 – 2022
MSc in Telecommunication Engineering (Bilingual) — 9.6/10

Thesis: External Learning Analytics Tool for Aula Global Courses. Designed and implemented an analytics platform integrating with UC3M's Aula Global (Moodle-based LMS) to provide instructors with interactive dashboards for monitoring student engagement, quiz performance, and activity patterns. This work later evolved into Statoodle.

TelecomsLearning AnalyticsFull-stack
2016 – 2020
BSc in Telecommunication Technologies (Telematics) — 10/10 Honours

Thesis: Accelerating PageRank with ZCU102-ES2 FPGA. Implemented the PageRank graph algorithm on the Xilinx ZCU102 UltraScale+ MPSoC, exploiting HW/SW co-design with Vivado HLS to achieve significant speedup over CPU baselines through memory access optimisation and pipeline parallelism. Supervised by Miquel Moretó Planas (BSC).

TelematicsFPGAHPCPageRankXilinx

Contact

Let's Connect

Open to roles in embedded security engineering, firmware vulnerability research, and hardware security R&D — particularly in IoT, automotive, semiconductor, or critical infrastructure sectors.


Available for full-time positions, research collaborations, and consulting.