Embedded Systems Security Bootcamp
Course Objectives
This training provides a deep background for security for
embedded systems including the greatest and latest attacks &
countermeasures for microcontrollers, microprocessors and FPGAs.
The first part of the training starts by introducing the elementary terms and attack surface on embedded systems as well as building blocks that consist of security solutions such as random numbers, encryption, and authentication, digital signatures, secured boot and tampering.
The second part of the training is dedicated to hardware security and covers secure hardware architectures, Root of Trust, PUF, multicore and many-cores protections, memory protection (volatile and non-volatile), side-channel protections, circuit level protection and FPGA security.
The third part of the training is dedicated to software security and covers common software attacks, defensive software security architectures, data protection techniques, and firmware protection.
The course shows the difference security solutions applied to MCUs, MPUs and FPGAs and explore the quality of the various solutions and design tradeoffs such as power consumption, silicon area and performance.
The training uses design example that accompanies the training material and provide a system level security understating by demonstrating the theory with real use-case.
The first part of the training starts by introducing the elementary terms and attack surface on embedded systems as well as building blocks that consist of security solutions such as random numbers, encryption, and authentication, digital signatures, secured boot and tampering.
The second part of the training is dedicated to hardware security and covers secure hardware architectures, Root of Trust, PUF, multicore and many-cores protections, memory protection (volatile and non-volatile), side-channel protections, circuit level protection and FPGA security.
The third part of the training is dedicated to software security and covers common software attacks, defensive software security architectures, data protection techniques, and firmware protection.
The course shows the difference security solutions applied to MCUs, MPUs and FPGAs and explore the quality of the various solutions and design tradeoffs such as power consumption, silicon area and performance.
The training uses design example that accompanies the training material and provide a system level security understating by demonstrating the theory with real use-case.
General Information
Prerequisites
Duration & Attendance
3 days
Target Audience
Hardware, software, system engineers and team leaders that would like to understand what security is in embedded systems and apply that in projects
Additional Information
Teaching Methods & Tools
- Course book
- Workbook