Barr Group FacebookBarr Group TwitterBarr Group LinkedInBarr Group Vimeo

Course Overview

Course Length: 
4 Days
CEUs: 
3.0
Format: 
Lecture

In today’s explosive growth of interconnectivity, the importance of developing of safe and security-hardened embedded systems has never been more critical. In this lecture series, attendees will learn the best design practices for developing both safe and secure embedded systems. This course will dive deep into critical security issues such as embedded crypto and retrofitting security and the use of coding standards, static analysis, and other best practices to increase reliability, safety, and security in embedded devices.

This course is split into two sections. Individual section registration is available.

Course Sections

SECTION I: Best Practices for Designing Secure Embedded Systems

Length: 2 Day
Format: Lecture
CEUs: 1.5

Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be hardened by following a variety of best practices. This two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and defend against the most common attacks.

Topics covered in this section include:

  • Threat Assessment
  • Protecting Data at Rest
  • Protecting Data in Motion
  • Defenses in Software

SECTION 2: Best Practices for Designing Safe Embedded Systems

Length: 2 Days
Format: Lecture
CEUs: 1.5

Embedded systems are pervasive: from implantable medical devices to self-driving cars. The risks of human injury are also rising as more embedded systems connect to the internet and each other - becoming open to hacking as well as malfunction.

This course explains several key design techniques that you can employ to develop safer and more reliable embedded systems. Through our consulting with many companies in a range of industries, we are continually surprised that such techniques -- including the techniques you will learn in this course -- are not more widely known and practiced.

In this 2-day section, attendees will learn "what, why and how" of approximately a dozen practical, lightweight techniques for designing safer and more reliable embedded systems. We will focus on minimizing hazards and malfunctions though a combination of lightweight, demonstrably-effective design techniques. Architectural, process and cultural aspects will also be covered.

Syllabus

SECTION I: Best Practices for Designing Secure Embedded Systems
Length: 2 Day
Format: Lecture

CEUs: 1.5

Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be hardened by following a variety of best practices. This two-day training gives you the skills to harden your embedded system to prevent vulnerabilities and defend against the most common attacks.

Topics covered in this section include:

  • Introduction
    • Embedded Systems Attacks
    • Uniquely Embedded Concerns
    • Reliability and Security
    • Obscurity and Security
    • Entropy and Random Numbers
  • Threat Assessment
    • Attackers and Assets
    • Attack Surface
    • Attack Trees
    • Security Policy
  • Protecting Data at Rest
    • Block Ciphers
    • Cipher Modes
    • Hashes
    • Message Authentication Codes
  • Protecting Data in Motion
    • Public-Key Cryptography
    • Secure Protocols
    • TLS/SSL
  • Defenses in Software
    • Common Firmware Vulnerabilities
    • Defensive Software Architectures
    • Defensive Hardware Interfaces
  • Defenses in Hardware
    • Securing External Memory
    • JTAG/Debug Port Considerations
    • Other Physical Attack Vectors
    • Tamper Detection and Logging
  • Wrap-up and Discussion

SECTION 2: Best Practices for Designing Safe Embedded Systems
Length: 2 Days
Format: Lecture

CEUs: 1.5

Embedded systems are pervasive: from implantable medical devices to self-driving cars. The risks of human injury are also rising as more embedded systems connect to the internet and each other - becoming open to hacking as well as malfunction.

This course explains several key design techniques that you can employ to develop safer and more reliable embedded systems. Through our consulting with many companies in a range of industries, we are continually surprised that such techniques -- including the techniques you will learn in this course -- are not more widely known and practiced.

In this 2-day section, attendees will learn "what, why and how" of approximately a dozen practical, lightweight techniques for designing safer and more reliable embedded systems. We will focus on minimizing hazards and malfunctions though a combination of lightweight, demonstrably-effective design techniques. Architectural, process and cultural aspects will also be covered.

Topics covered in this section include:

  • System Partitioning
  • Run-Time Monitoring
  • Design for Test
  • Managing Time
  • Run-time Logging
  • Safety Case
  • Managing Complexity
  • Requirements
  • Coding Standard
  • Static Analysis
  • Code Inspections
  • Issue Tracking
  • Post Mortems​

Prerequisites

Attendees should have prior experience in the design of one or more embedded systems.

Private Technical Consults

Do you or your team have a project-specific question that you would like to discuss with an expert?  If so, attendees of the Maryland session of the Best Practices for Designing Safe & Secure Embedded Systems in Germantown, MD are eligible for a complimentary 30-minute private consult with a member of our expert technical team to discuss issues faced by you and your design team. 

These technical consultations provide an opportunity for attendees to confidentially discuss details of their project with Barr Group engineers and ask project-specific questions that may not be of interest to the class or appropriate to discuss in a classroom setting. Discussions may range from high-level software/hardware architecture questions to the best way to implement a specific Android device driver to the most cost-effective ways to detect software intrusion or implement public key encryption... and any other project-related technical questions that you have.

Conferences will be scheduled for Friday, the day immediately following the conclusion of each course. For more information or to schedule a conference, please contact experts@barrgroup.com.

Meetings are limited to one 30 minute session per company/group.  In the event that you or your team are unable to attend a Friday meeting, alternate meeting dates can be arranged.  If you believe a non-disclosure agreement is necessary to discuss your sensitive project, please let us know and arrangements can be made prior to the consult.

Related Courses

Upcoming Sessions

Date(s) Location Regular Price EARLY REGISTRATION PRICE* Register
May 22 to May 23
Best Practices for Designing Safe & Secure Embedded Systems (SAFETY SECTION ONLY)
Germantown, Maryland, United States $1,599.00 $1,299.00 Inquire
May 22 to May 25
Best Practices for Designing Safe & Secure Embedded Systems
Germantown, Maryland, United States $2,199.00 $1,899.00 Inquire
May 24 to May 25
Best Practices for Designing Safe & Secure Embedded Systems (SECURITY SECTION ONLY)
Germantown, Maryland, United States $1,599.00 $1,299.00 Inquire
Jun 19 to Jun 20
Best Practices for Designing Safe & Secure Embedded Systems (SAFETY SECTION ONLY)
Munich, Bayern, Germany 1799,00 € 1499,00 € Inquire
Jun 19 to Jun 22
Best Practices for Designing Safe & Secure Embedded Systems
Munich, Bayern, Germany 2499,00 € 2199,00 € Inquire
Jun 21 to Jun 22
Best Practices for Designing Safe & Secure Embedded Systems (SECURITY SECTION ONLY)
Munich, Bayern, Germany 1799,00 € 1499,00 € Inquire

Find out More

To find out more about our upcoming public trainings, go to our Training Calendar.

Contact Us to find out more about this course or to enquire about an on-site training at your company.

Recording Policy

All Barr Group Training Public and On-site courses may not be videotaped or photographed without consent from Barr Group's executive team.