This content is a press release from our partner Business Wire. The AP newsroom and editorial departments were not involved in its creation.
PRESS RELEASE from provider: Business Wire
This content is a press release from our partner Business Wire. The AP newsroom and editorial departments were not involved in its creation.

3-Day Training: Embedded Security for Automotive (Amsterdam, Netherlands - May 6-8, 2019) - ResearchAndMarkets.com

February 22, 2019

DUBLIN--(BUSINESS WIRE)--Feb 22, 2019--The “3-Day Training: Embedded Security for Automotive” training has been added to ResearchAndMarkets.com’s offering.

Modern cars are digital devices, controlled with multiple ECUs and millions of lines of software code. They are the frontline of modern embedded device development. With respect to unique safety requirements and rapid development of V2x communications, automotive security benefits from the expertise of other embedded applications.

The Embedded Security for Automotive is brought to you by embedded device security veterans, with years of expertise in securing payment and content protection application. In this training you will look at an automotive solution from an attacker’s perspective. You will learn how ECUs can be hacked, and identify ways to apply this knowledge to your product and make it more robust. As a result, you will obtain the expertise to make effective security-related decisions throughout the entire development lifecycle of a vehicle electronic system.

Key Learning Objectives

The goal of the three day interactive training is to gain an overview of in vehicle security with focus on critical systems. In the training your team gains a solid technical grasp of the fundamentals of security engineering, and how they relate to typical sub-components presented on an embedded system, and the functionality of an embedded system.

Next, we look at the automotive target from the perspective of an attacker who aims to compromise the systems assets, gaining runtime control and or retrieving sensitive data, etc. You will obtain new skill sets for identifying these assets, determine the most likely attack paths an attacker will use and refine this attack path in order to discover tooling available to an attacker used to compromise the system. During the training we discuss why implementation attacks are a threat to the security of protocols and cryptographic algorithms, MISRA-C coding guidelines, side channel analysis and fault injection attacks.

Finally, we discuss system defense strategies which are the most sophisticated and complex view of an embedded system. Creating a defense strategy requires not only the understanding of how a system works or how an attacker would compromise an asset, but also to have the ability to prioritize defense according to risk, time, cost, surface, etc.

Prerequisite Knowledge

Knowledge of basic computer science concepts. More importantly an open mind and willingness to learn!

Hardware Requirements

Please bring your computer or laptop & power brick

Make sure you have ~10GB free disk space (otherwise the VM we will be using may not fit)

Software Requirements

Please install VirtualBox (latest version) in your machine, as well as install the VirtualBox extensions.

If you want, you can bring your preferred note-taking tool (e.g. paper notebook) besides your laptop. Handouts will be provided for exercises that require taking notes.


Time: 9.00am - 6.00pm

DAY 1: Fundamentals

Part 1: Fundamentals of security engineering

Part 2: An introduction to Embedded Systems

DAY 2: Attacks on modern embedded systems

DAY 3: Defense plan and implementation security

Case study: the JEEP hack:

For more information about this training visit https://www.researchandmarkets.com/research/ftphbr/3day_training?w=4

View source version on businesswire.com:https://www.businesswire.com/news/home/20190222005187/en/

CONTACT: ResearchAndMarkets.com

Laura Wood, Senior Press Manager


For E.S.T Office Hours Call 1-917-300-0470

For U.S./CAN Toll Free Call 1-800-526-8630

For GMT Office Hours Call +353-1-416-8900

Related Topics:Professional Development and Training,IT Security



SOURCE: Research and Markets

Copyright Business Wire 2019.

PUB: 02/22/2019 06:05 AM/DISC: 02/22/2019 06:06 AM