Essential Fault Injection
Riscure Academy - Classroom TrainingEssentials of Fault Injection
Duration
3 courses
6-8 weeks
20+ hours self-paced eLearning and practical exercise
4.5 hours Live Mentoring
Certificate
80% or higher on final assessment
Team report (pre vs post assessment)
Interactive
Exercises
Assignments
Quizzes
Live mentoring
Scalable
Self-paced eLearning
Scheduled live mentoring
Spaced for efficiency & effectiveness
Scale to multiple groups
After this program participants will be able to
Security Engineering
Recognize security assets in a TOE
Understand how to apply the attack tree method
Rate and select attack paths
Describe main methods of defence
Embedded Systems
Use open source tooling to identify PCB interfaces
Determine relevance of a component for security
Understand relevance of a component to an attacker
Create and apply countermeasures
Defence & Countermeasures
Evaluate required security properties of an asset
Understand modern threats: implementation attacks, SCA, FI
Understand the role of team work in implementation of security primitives
Understand how modern countermeasures can protect against modern threats
Essentials of Fault Injection
No specific background required
Engineering / Security background preferred
Relevant for anyone working with embedded systems, from decision-makers to engineers
Understand security engineering principles
Understand an embedded system holistically
Setup protections against attacks
Fundamentals of FI
Introduction to Fault Injection
- What is a fault (or glitch)?
- Types of fault injection
- Tools for fault injection
- Basic notions of cryptography
Bypassing a security check (practical assignment)
- Finding a exploitable point in the code
Differential Fault Analysis
- Finding a exploitable point in the code
- Efficiently tuning parameters
- Recovering the key
DFA on DES (practical assignment)
- Recovering a DES key with DFA
Countermeasures
- Common countermeasures
- Coding guidelines
Raising the stakes
Bypassing a hardened security check (practical assignment)
- Bypass a protected security check
Optical Fault Injection (practical assignment)
- How does it work?
- Practicalities
- Safety
- Target Preparation
- Different wavelengths and laser types
- Building a setup
Electro Magnetic Fault Injection (practical assignment)
- How does it work?
- Building a setup
Q&A and conclusion
Lead developer
Name Here
Actionable and indispensable knowledge of security in Embedded Systems and IoT devices. Training on hardware and software security in a classroom setting, online or hosted in your own knowledge program.
Let’s schedule a digital meeting
What people say
“Very interesting learning approach and material across different aspects of state-of-the-art SoC development with Security in mind. I really want to thank Riscure for offering such good trainings, and the their trainers who make amazing use of their skills, experiences and kindness to easily communicate complex concepts to the audience.”
– Qualcomm
Get Started Today
Don’t let your organization’s embedded systems become an easy target. Invest in the security and success of your business by partnering with Riscure Academy. Contact us today to discuss your training needs and explore our approach. Together, we’ll empower your team to secure your organization’s future.
Frequently asked questions
Do you do individual training?
What is the minimum group size for your expert-led training program?
Are your programs delivered online or as classroom ?
customer's location. Our online programs blend self-paced e-learning, exercises, assessments, and in certain cases expert-sessions (like Q&A webinars or Group Exercises) with Riscure experts.
When can we start with the training/ what do the training schedules look like?
Does customer have access to the training materials after the program?
For expert-led group training, including online/hybrid and classroom formats, access to relevant training materials remains available after the training period. The formal training schedule with deadlines is coordinated between Riscure and the customer.