Security aspects in embedded devices

Security aspects in embedded devices

The module covers the key security aspects of embedded devices, with a focus on the hardware and software used in critical applications. The course will explore attacks and countermeasures specific to the embedded environment, with practical workshops to reinforce theoretical knowledge. The module has the following objectives: (i) understand the principles of security in embedded systems, (ii) identify hardware and software vulnerabilities specific to embedded devices, (iii) apply protection techniques against attacks targeting embedded platforms, and (iii) develop practical skills in threat analysis and mitigation.

Topics

  • Introduction to Security in Embedded Systems; Architectures and Attack Models; Hardware Security; Embedded Software Security; Secure Communications; Trends and Case Studies

Target

Training for employees and professionals

Course structure

Module 1 - INTRODUCTION TO SECURITY IN EMBEDDED SYSTEMS
10 hours
  • Differences between security in embedded systems and general-purpose systems
  • Security principles: confidentiality, integrity, availability
  • Specific threats: physical attacks, software attacks and firmware vulnerabilities
Module 2 - ATTACK STRATEGIES AND MODELS
10 hours
  • Hardware architectures of embedded devices (SoC, MCU, FPGA)
  • Threat models and risk analysis
  • Introduction to TrustZone, SGX and other security technologies
Module 3 - HARDWARE SECURITY
10 hours
  • Hardware-level attacks
  • Side-channel attacks (DPA, SPA)
  • Fault injection (laser, glitching)
  • Hardware countermeasures
  • Randomisation
  • Masking techniques and DPA countermeasures
Module 4 - EMBEDDED SOFTWARE SECURITY
5 hours

 

  • Buffer overflows and mitigations
  • Firmware security
  • Encryption and authentication techniques
  • Secure Boot and secure updates
  • Using tools such as Binwalk for firmware analysis
Module 5 - SECURE COMMUNICATION
5 hours
  •  Cryptographic protocols for IoT and embedded systems (TLS/DTLS, MQTT)
  • Implementation of secure cryptographic keys.
  • Vulnerabilities in wireless protocols (ZigBee, Bluetooth)

 

WORKSHOP
16 hours
  •  Firmware analysis: Decoding and reverse engineering with Binwalk and Ghidra
  • Side-channel attack: Simulation and detection of DPA attacks on demo hardware
  • Secure Boot: Implementation of a secure boot system using microcontrollers
  • Simulation of wireless attacks: Security analysis of ZigBee or Bluetooth
  • Hardware testing: Identification of vulnerabilities using fault injection on FPGAs

Security aspects in embedded devices

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…