Hardware Security is relatively undefined field. There is only a very small amount of readily available, logically organized, and directly applicable information. The courses listed here are part of an effort to change that, one bit at a time.
These courses regularly run in conjunction with conferences around the world, in addition to independent public and private offerings. Applied Physical Attacks on x86 Systems is a 2- to 5-day hands-on workshop covers a series of basic physical attacks that don’t require advanced modification or manipulation of an x86 target system. Applied Physical Attacks on Embedded Systems is a 2- to 3-day hands-on workshop covers a series of basic physical attacks that don’t require advanced modification or manipulation of an embedded ARM or MIPS target system. Applied Physical Attacks and Hardware Pentesting is a 2- to 3-day hands-on workshop which expands on the embedded class, incorporating more advanced attacks and fitting hardware into a standard penetration testing workflow. Applied Physical Attacks and Silicon Defenses is a 2- to 5-day hands-on workshop, coming in Fall 2017, covers pre- and post- silicon security testing of silicon, targeting an open-source verilog SOC and additional incorporated IP blocks.
These 90 minute to half-day workshops have run at hackerspaces, conferences, hardware hacking villages, and other events. Hands-on JTAG for Fun and Root Shells covers the hardware and software setup for JTAG debugging on an ARM platform using OpenOCD. Once everything is configured, it introduces a couple methods of using JTAG to escalate privilege of and existing shell WTFPGA starts with a crash course in Verilog and introduces some of the core concepts of FPGAS for basic logic by guiding attendees through implementing a very basic hexadecimal calculator with switches and displays. Sidechannel Attacks for Hardware N00BZ introduces the concept of hardware side channel attacks and walks through the process of using hardware to conduct a timing side channel attack on a 4-digit PIN entry system
These courses were previously presented by SecuringHardware but have been superseded or incorporated into updated courses. Secure Hardware Development was a 2-day lecture-driven course applies the Security Development Lifecycle to hardware projects including ASIC design. It will be superseded by Applied Physical Attacks and Silicon Defenses which includes the hands-on element missing from this course Software Exploitation via Hardware Exploits was developed and co-presented by SecuringHardware in 2014 and 2015, but has been superseded by a completely updated and rewritten Applied Physical Attacks on Embedded Systems. In addition, Applied Physical Attacks and Hardware Pentesting extends on the content covered in this course.