Get in Touch

Course Outline

Introduction

  • Differences between general security and embedded systems security.

Characteristics of Embedded Application Security

  • Embedded network transactions.
  • Automotive security.
  • Android devices.
  • Next-generation software-defined radio.

Critical Aspects of an Embedded System

  • Microkernel vs. monolithic architectures.
  • Independent security levels.
  • Core security requirements.
  • Access control mechanisms.
  • I/O virtualization.

Performing Threat Modeling and Assessment

  • Identifying attackers and assets.
  • Analyzing attack surfaces.
  • Constructing attack trees.
  • Establishing a security policy.

Developing Secure Embedded Software

  • Principles of secure coding.
  • Secure program design.
  • Minimal implementation.
  • Component architecture.
  • Principle of least privilege.
  • Secure development process.
  • Independent expert validation.
  • Model-driven design.
  • Code review and static analysis.
  • Security testing.
  • Peer code reviews.

Understanding and Implementing Cryptography

  • Cryptographic modes.
  • Cryptographic hashes.
  • Cryptographic certifications.
  • Key management.
  • Block ciphers.
  • Message Authentication Codes.
  • Random Number Generation.

Data Protection

  • Data-in-motion protocols.
  • Securing data in motion.
  • Data-at-rest protocols.
  • Securing data at rest.

Mitigating Attacks

  • Common software attacks.
  • Preventing side-channel attacks.

Retrofitting Security in Existing Projects

  • Securing bootloaders and firmware updates.

Summary and Next Steps

Requirements

  • Experience with embedded systems development.

Target Audience

  • Professionals working with embedded systems.
  • Security specialists.
 21 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories