Best Practices for Securing Embedded Systems

Course#: BSEMB1025 - Also available as a public course

About this Course

Course Type Course Code Duration
Embedded Software BSEMB1025 2 Days

The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices. This in-depth two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and detect the most popular types of attacks.

Why Attend this Course?

What Makes this Course Stand Apart?

What you will Learn?

Audience

Embedded system design engineers and their managers

Prerequisites

Experience in the design of embedded systems

Course Outline

Introduction
A Brief History of Embedded Systems Attacks
Uniquely Embedded Concerns
Reliability as Security
Security as Arms Race
Cryptography in a Nutshell
Weakest Link Principle
Proper Role of Obscurity
Sources of Entropy
Threat Assessment
Attackers and Assets
Attack Surface
Attack Trees
Security Policy
Disassembly and Reverse Engineering
Protecting Data at Rest
Introduction
Block Ciphers
Cipher Modes
Hashes
Message Authentication Codes

Protecting Data in Motion
Public-Key Cryptography
TCP/IP and Sockets
Secure Protocols
TLS/SSL
Converting an Unsecured Application
Other Considerations
Defenses in Software
Common Firmware Vulnerabilities
Defensive Software Architectures
Defensive Hardware Interfaces
Defenses in Hardware
Securing External Memory
JTAG/Debug Port Considerations
Other Physical Attack Vectors
Mechanical Security
Logging Tamper Events
Wrap-up and Discussion

0

Start typing and press Enter to search