Early bird registration rate ends on the 31st of January
This training is built to give a complete understanding of Integrated Circuits while explaining the different threats that they face, including the extraction of their embedded software and data.
The different chapters are organized so as to let the attendees discover each new topic in a progressive manner that reflects the Reverse-Engineering specific mindset.
This proposed learning curve aims at letting the attendees complete the training by strategizing an Invasive Attack involving Reverse-Engineering, circuit modification and micro-probing.
Finally, this training is also useful to discuss the current state of Integrated Circuits and embedded counter-measures security.
The primary goal of this training is to provide security professionals and team leaders the skills, mindset and background information necessary to successfully perform analysis of Integrated Circuits (ICs), get knowledge about the diverse means of code extraction and evaluate the efficiency of the existing counter-measures.
It is designed to give to Integrated Circuit professionals a deep understanding of the complete Reverse-Engineering and Attack chain to help them explore and/or build more secure designs but also to give to newcomers a detailed overview for a fast ramp-up.
Students who complete this course will be familiar with all important classes of low-level hardware attacks (shield and hardware counter-measures bypass – ROM and Flash/EEPROM dump – bus passive and active probing – …) through real world examples covering the entire analysis workflow from the lab to the data analysis.
The training describes modern analysis methods involving automation and discuss the efficiency of encryption and modern counter-measures in such a context.
Texplained training combines theoretical lectures and practical assignments so students are ready to analyze any Integrated Circuit at different level from SEM pictures and layout information to schematics.
2. RECOMMENDED READING
3. INTEGRATED CIRCUITS
5. DIGITAL ELECTRONICS
6. MANUFACTURING PROCESS
7. FAILURE ANALYSIS
8. INVASIVE ATTACKS
9. SHIELD / MESH
10. AUTOMATING THE REVERSE ENGINEERING