2020 Summer Training Schedule
People have been asking for our training schedule for this summer. Today we're happy to finally announce two additional classes in addtion to the Applied Glitching of Real-World Hardware Targets training that we announced on twitter last week. If you're interested in more than one class, consider requesting an All-Access Subscription instead. This will get you access to all the upcoming courses we're offering this summer as well as their recordings.
Applied Glitching of Real-World Hardware Targets
First of all, in case you missed it, you should really check out our Applied Glitching of Real-World Hardware Targets training. We've already been seeing a lot of interest in it so make sure you secure your slot sooner rather than later. This course is based on our experience glitching several several different platforms in recent years. The goal of this course is to be the most comprehensive overview of glitching modern hardware platforms. As part of this course, we'll be breaking everything ranging from clock glitching code read protection to breaking trustzone and defeating some modern SoCs.
If you're interested in being part of the best glitching course on the market, you can sign up here.
Intro to Fuzzing
One of the most effective ways to find bugs in recent years has been fuzzing. It's one of our favorite techniques for finding bugs as well. Today we're happy to announce that will be offering an Intro to Fuzzing course as part of our offering this summer. In this training you will learn how a fuzzer works, how to build your own fuzzers for specific file formats, have a chance to discover some of the most infamous vulnerabilities yourself and also learn how to efficiently analyze fuzzing results. Beyond writing your own fuzzers this course will also cover one of the most popular fuzzers in use today, i.e. American Fuzzy Lop, and how to perform fuzz testing efficiently on software.
If you're interested in this course, you can sign up here.
Intro to Hardware/Software Co-Design for Security
One of the most popular subjects thus far has been FPGAs. For this reason, we're offering even more FPGA trainings. Today we're please to announce two addtional upcoming FPGA courses that we'll together with our new trainer Josh Datko. For both of these courses we're still finalizing the full outline and it will be online shortly.
This first course will focus on prototyping, designing and implementing modern embedded systems featuring System-on-Chips (SoCs). We call this course Intro to Hardware/Software Co-Design for Security. For this course we will be using the Xilinx Zynq 7000 series SoC/FPGAs. This course will take participants through all the steps required to run linux and implement custom logic within the SoC. We'll explain the details involved in working with the Xilinx toolchain, as well as implement and run several demos on the Zynq. Most importantly we'll take you all the way through to booting Linux.
If you're interested in this course, you can sign up for it here.
Anti-Tamper (AT) and Physically Unclonable Functions (PUFs)
Whenever we're discussing FPGAs as part of our trainings, there's a handful of questions that come up related to the security of the FPGAs themselves. One question that always comes up in our FPGA classes is how secure are bitstream designs on FPGAs? How can FPGAs be used to ensure the security of a larger system? To answer these questions and more, we're happy to announce our Anti-Tamper (AT) and Physically Unclonable Functions (PUFs). Not only will we cover, implement and test all the security mechanisms offered by xilinx, but we'll also try out some popular alternatives, such as Phisically Unlclonable Functions (PUFs).
If you're interested in this course, you can sign up for it here.
Full List of Upcoming Trainings
If you're not sure what you should do this summer, here's a full list of upcoming classes.
- Introduction to Field Programmable Gate Arrays (FPGAs). July 27 – July 28, 2020.
- Introduction to Fuzzing. July 30 – July 31, 2020.
- Hardware Hacking and Instrumentation with FPGAs. August 04 – August 07, 2020.
- Introduction to Hardware Hacking and Reverse Engineering. August 08 – August 09, 2020.
- Firmware reverse engineering with Ghidra (CET Timezone). August 10 – August 11, 2020.
- Firmware reverse engineering with Ghidra (US Eastern). August 12 – August 13, 2020.
- Applied Glitching of Real-World Hardware Targets. August 17 – August 20, 2020.
- Intro to Hardware/Software Co-Design for Security. August 25 – August 26, 2020.
- Anti-Tamper (AT) and Physically Unclonable Functions (PUFs). August 27 – August 28, 2020.
YouTube Highlights
We've uploaded the YouTube highlights of Day1 and Day2 of Intro to FPGAs to Youtube. You can also check them out here.
Day 1
Day 2
About the Author
Dmitry Nedospasov
Dmitry is a hardware hacker, hardware design engineer, security researcher, speaker, and reverse-engineerer. Dmitry did his PhD in the field of IC security and PUFs.