Applied Physical Attacks Series
These courses regularly run in conjunction with conferences around the world, in addition to independent public and private offerings.
Applied Physical Attacks 1: Embedded and IoT Systems (online) covers a series of basic physical attacks that don’t require advanced modification or manipulation of an embedded target system.
Applied Physical Attacks 3: Rapid Protoyping focuses on using rapid prototyping and hardware tooling to interface to target systems.
Applied Physical Attacks 4: Hardware Implants brings the rapid prototyping and hardware pentesting techniques together to build standalone hardware attack devices.
Due to the targeted focus of these courses, they’re rarely offered as public training but are available for private offerings.
Applied Physical Attacks on x86 Systems covers a series of basic physical attacks that don’t require advanced modification or manipulation of an x86 target system.
Applied Physical Attacks and Silicon Defenses covers the hardware security lifecycle plus pre- and post- silicon security testing of silicon, targeting a verilog SOC and additional IP blocks.
Hardware Attacks, Risks, Threats, and Mitigations provides a high-level, comprehensive survey of the state-of-the-art in hardware attacks, threats, and risks.
These 90 minute to half-day workshops have run at hackerspaces, conferences, hardware hacking villages, and other events.
Applied Physical Attacks on a Raspberry Pi introduces hardware hacking basics with an inexpensive toolset. This workshop fully published and freely available to do on your own or run for a group.
Hands-on JTAG for Fun and Root Shells covers the hardware and software setup for JTAG debugging on an ARM platform using OpenOCD. Once everything is configured, it introduces a couple methods of using JTAG to escalate privilege of and existing shell.
WTFPGA starts with a crash course in Verilog and introduces some of the core concepts of FPGAS for basic logic by guiding attendees through implementing a very basic hexadecimal calculator with switches and displays.
Sidechannel Attacks for Hardware N00BZ introduces the concept of hardware side channel attacks and walks through the process of using hardware to conduct a timing side channel attack on a 4-digit PIN entry system.
These courses were previously presented by SecuringHardware but have been superseded or incorporated into updated courses.
Secure Hardware Development was a 2-day lecture-driven course applies the Security Development Lifecycle to hardware projects including ASIC design. It will be superseded by Applied Physical Attacks and Silicon Defenses which includes the hands-on element missing from this course.
Software Exploitation via Hardware Exploits was developed and co-presented by SecuringHardware in 2014 and 2015, but has been superseded by a completely updated and rewritten Applied Physical Attacks on Embedded Systems. In addition, Applied Physical Attacks and Hardware Pentesting extends on the content covered in this course.