What are you looking for?
Embedded System Security Training
Gain a comprehensive understanding of embedded systems with a focus on security engineering and defense strategy.
Training at a Glance
Fundamentals of Embedded System Security
This training provides a primer for implementing security for embedded systems. Participants will learn the typical components present in an embedded system and how it functions. We’ll look at an embedded system from the perspective of an attacker who aims to compromise the assets. Participants learn how to identify relevant assets, determine the most likely attack paths, and refine this attack path by discovering tooling available to an attacker. Finally, we discuss defense principles, the most sophisticated and complex view of an embedded system.
Creating a defense strategy requires not only understanding how a system works or how an attacker would compromise an asset, but also the ability to prioritize defenses according to risk, time, cost, and attack surface. After the training, participants will be able to use open source tooling to identify printed circuit board (PCB) interfaces, understand the relevance of a component to attackers and security, understand modern threats, and create and apply countermeasures.
Participants receive a custom designed PCB, the Advanced Training Target, with a full hacking toolkit to carry out a variety of exercises for a hands-on, practical, and highly effective training.
Training Outline
- Introduction to black-box evaluations
- Identifying components on a printed circuit board (PCB)
- Evaluating trust boundaries of a TOE at physical level
- Retrieving assets from the TOE
- Dumping the firmware
- Measurement tools
- Multi-meter, oscilloscope, and other tools
- Physical interfaces
- UART, I2C, SPI, and JTAG
- High-level and other interfaces
- USB, network interfaces, and other interfaces
- Defenses: What is security?
- Countermeasures for physical attacks (seals, sensors obfuscation)
- Countermeasures for implementation attacks (fault injection and side channel analysis)
- Defenses: SDLC
- Defenses: A case study
- Modern threats: Software security
- Modern threats: Implementation attacks (SCA)
- Modern threats: Implementation attacks (FI)
Related Trainings
Interested in this service? Reach out to learn more.