2020 Summer Training Schedule

Dmitry Nedospasov
July 02, 2020

People have been asking for our training schedule for this summer. Today we're happy to finally announce two additional classes in addtion to the Applied Glitching of Real-World Hardware Targets training that we announced on twitter last week. If you're interested in more than one class, consider requesting an All-Access Subscription instead. This will get you access to all the upcoming courses we're offering this summer as well as their recordings.

Applied Glitching of Real-World Hardware Targets

First of all, in case you missed it, you should really check out our Applied Glitching of Real-World Hardware Targets training. We've already been seeing a lot of interest in it so make sure you secure your slot sooner rather than later. This course is based on our experience glitching several several different platforms in recent years. The goal of this course is to be the most comprehensive overview of glitching modern hardware platforms. As part of this course, we'll be breaking everything ranging from clock glitching code read protection to breaking trustzone and defeating some modern SoCs.

If you're interested in being part of the best glitching course on the market, you can sign up here.

Intro to Fuzzing

One of the most effective ways to find bugs in recent years has been fuzzing. It's one of our favorite techniques for finding bugs as well. Today we're happy to announce that will be offering an Intro to Fuzzing course as part of our offering this summer. In this training you will learn how a fuzzer works, how to build your own fuzzers for specific file formats, have a chance to discover some of the most infamous vulnerabilities yourself and also learn how to efficiently analyze fuzzing results. Beyond writing your own fuzzers this course will also cover one of the most popular fuzzers in use today, i.e. American Fuzzy Lop, and how to perform fuzz testing efficiently on software.

If you're interested in this course, you can sign up here.

Intro to Hardware/Software Co-Design for Security

One of the most popular subjects thus far has been FPGAs. For this reason, we're offering even more FPGA trainings. Today we're please to announce two addtional upcoming FPGA courses that we'll together with our new trainer Josh Datko. For both of these courses we're still finalizing the full outline and it will be online shortly.

This first course will focus on prototyping, designing and implementing modern embedded systems featuring System-on-Chips (SoCs). We call this course Intro to Hardware/Software Co-Design for Security. For this course we will be using the Xilinx Zynq 7000 series SoC/FPGAs. This course will take participants through all the steps required to run linux and implement custom logic within the SoC. We'll explain the details involved in working with the Xilinx toolchain, as well as implement and run several demos on the Zynq. Most importantly we'll take you all the way through to booting Linux.

If you're interested in this course, you can sign up for it here.

Anti-Tamper (AT) and Physically Unclonable Functions (PUFs)

Whenever we're discussing FPGAs as part of our trainings, there's a handful of questions that come up related to the security of the FPGAs themselves. One question that always comes up in our FPGA classes is how secure are bitstream designs on FPGAs? How can FPGAs be used to ensure the security of a larger system? To answer these questions and more, we're happy to announce our Anti-Tamper (AT) and Physically Unclonable Functions (PUFs). Not only will we cover, implement and test all the security mechanisms offered by xilinx, but we'll also try out some popular alternatives, such as Phisically Unlclonable Functions (PUFs).

If you're interested in this course, you can sign up for it here.

Full List of Upcoming Trainings

If you're not sure what you should do this summer, here's a full list of upcoming classes.

YouTube Highlights

We've uploaded the YouTube highlights of Day1 and Day2 of Intro to FPGAs to Youtube. You can also check them out here.

Day 1
Day 2

About the Author

Dmitry Nedospasov

Dmitry is a hardware hacker, hardware design engineer, security researcher, speaker, and reverse-engineerer. Dmitry did his PhD in the field of IC security and PUFs.