Essential SCARiscure Academy - Classroom Training
Essentials of Side Channel Analysis
20+ hours self-paced eLearning and practical exercise
4.5 hours Live Mentoring
80% or higher on final assessment
Team report (pre vs post assessment)
Scheduled live mentoring
Spaced for efficiency & effectiveness
Scale to multiple groups
After this program participants will be able to
Recognize security assets in a TOE
Understand how to apply the attack tree method
Rate and select attack paths
Describe main methods of defence
Use open source tooling to identify PCB interfaces
Determine relevance of a component for security
Understand relevance of a component to an attacker
Create and apply countermeasures
Defence & Countermeasures
Evaluate required security properties of an asset
Understand modern threats: implementation attacks, SCA, FI
Understand the role of team work in implementation of security primitives
Understand how modern countermeasures can protect against modern threats
Essentials of Side Channel Analysis
No specific background required
Engineering / Security background preferred
Relevant for anyone working with embedded systems, from decision-makers to engineers
Understand security engineering principles
Understand an embedded system holistically
Setup protections against attacks
SCA & Signal Acquisition
Introduction to side channel analysis
- What is a side channel?
- Tools for side channel analysis
- Standard devices
- Basic notions of cryptography and statistics
Power analysis tools and setups (practical assignment)
- How to build a setup for power analysis
- Power traces acquisition
- Signal processing (aligning, resampling, filtering)
Common flavors of power analysis
- Simple Power Analysis (SPA)
- Differential Power Analysis (DPA)
- Correlation Power Analysis (CPA)
Raising the stakes
Power analysis on embedded systems (practical assignment)
- Building a setup
- Device preparation and interfacing
- DPA on a software implementation of DES/AES
Module development using Inspector (practical assignment)
- Writing simple modules for signal processing and device communication
Hardware crypto (practical assignment)
- Attacking a hardware implementation of DES/AES
EM acquisition & countermeasures
Electro-Magnetic analysis (EMA)
- Principles and tools
- Finding the hotspot
- Acquisition and signal processing
- DEMA on a hardware implementation of DES (practical assignment)
Other crypto implementations and attacks (practical assignment)
- Known key analysis
- Public key crypto
Actionable and indispensable knowledge of security in Embedded Systems and IoT devices. Training on hardware and software security in a classroom setting, online or hosted in your own knowledge program.
What people say
“Very interesting learning approach and material across different aspects of state-of-the-art SoC development with Security in mind. I really want to thank Riscure for offering such good trainings, and the their trainers who make amazing use of their skills, experiences and kindness to easily communicate complex concepts to the audience.”
Get Started Today
Don’t let your organization’s embedded systems become an easy target. Invest in the security and success of your business by partnering with Riscure Academy. Contact us today to discuss your training needs and explore our approach. Together, we’ll empower your team to secure your organization’s future.
Frequently asked questions
Do you do individual training?
What is the minimum group size for your expert-led training program?
Are your programs delivered online or as classroom ?
customer's location. Our online programs blend self-paced e-learning, exercises, assessments, and in certain cases expert-sessions (like Q&A webinars or Group Exercises) with Riscure experts.
When can we start with the training/ what do the training schedules look like?
Does customer have access to the training materials after the program?
For expert-led group training, including online/hybrid and classroom formats, access to relevant training materials remains available after the training period. The formal training schedule with deadlines is coordinated between Riscure and the customer.