ac6-training, un département d'Ac6 SAS
 
Site displayed in English (GB)
Site affiché en English (GB)View the site in FrenchVoir le site en English (USA)
go-up

leftthintrapezium-20-bb9203 ac6 > ac6-training > Programming > Safety and security > Developing C/C++ Secure Embedded Systems Inquire Download as PDF Call us Write us

SEC1 Developing C/C++ Secure Embedded Systems

formateur
Objectives
  • Introduction to embedded security and industry standards, including ISO/SAE 21434, IEC 62443, NIST SP 800-53, Common Criteria, and OWASP.
  • Learn about secure coding practices for C/C++ programming languages, including best practices for memory management, input validation, and error handling.
  • Introduce the RUST programming language and its built-in security features, including memory safety and type safety.
  • Learn about secure software development methodologies, including threat modeling, secure design principles, and secure coding standards.
  • Introduce techniques for ensuring security in embedded systems, including security testing, security provisioning, and secure boot processes.
  • Introduce cryptography in embedded system.
  • The course covers the design and implementation of secure embedded system hardware architecture, including secure boot processes and secure communication protocols.
  • Learn about secure communication in embedded systems, including network protocols, secure communication protocols, and secure data transfer.
  • Get an overview of security issues and best practices for Internet of Things (IoT) devices and systems.
  • Some programming concepts are desirable (whatever language)
  • Theoretical course
    • PDF course material (in English) supplemented by a printed version.
    • The trainer answers trainees' questions during the training and provide technical and pedagogical assistance.
  • Practical activities
    • Practical activities represent from 40% to 50% of course duration.
    • Code examples, exercises and solutions
    • One PC (Linux ou Windows) for the practical activities with, if appropriate, a target board.
      • One PC for two trainees when there are more than 6 trainees.
    • For onsite trainings:
      • An installation and test manual is provided to allow preinstallation of the needed software.
      • The trainer come with target boards if needed during the practical activities (and bring them back at the end of the course).
  • Downloadable preconfigured virtual machine for post-course practical activities
  • At the start of each session the trainer will interact with the trainees to ensure the course fits their expectations and correct if needed
  • Total: 18 hours
  • 3 sessions, 6 hours each
  • From 40% to 50% of training time is devoted to practical activities
  • Some Labs may be completed between sessions and are checked by the trainer on the next session
  • Any embedded systems engineer or technician with the above prerequisites.
  • The prerequisites indicated above are assessed before the training by the technical supervision of the traineein his company, or by the trainee himself in the exceptional case of an individual trainee.
  • Trainee progress is assessed in two different ways, depending on the course:
    • For courses lending themselves to practical exercises, the results of the exercises are checked by the trainer while, if necessary, helping trainees to carry them out by providing additional details.
    • Quizzes are offered at the end of sections that do not include practical exercises to verifythat the trainees have assimilated the points presented
  • At the end of the training, each trainee receives a certificate attesting that they have successfully completed the course.
    • In the event of a problem, discovered during the course, due to a lack of prerequisites by the trainee a different or additional training is offered to them, generally to reinforce their prerequisites,in agreement with their company manager if applicable.

Course Outline

  • Embedded Security Trends
    • Embedded Systems Complexity
    • Sophisticated Attacks
    • Processor Consolidation
  • Security Policies
    • Perfect Security ?
    • Embedded Security Challenges
    • Confidentiality, Integrity and Availability
    • Isolation
    • Information Flow Control
    • Physical Security Policies
  • Security Threats
    • Summary of issues
    • Cyberattack exploits
  • Legacy Systems
    • Updatability
    • Securing Legacy Systems
    • Project Requirements
    • Performance ?
  • Security standards
  • IoT recommended Security standards
  • Secure C
    • Preprocessor and macros
    • Compilation, Declaration, definition, and initialization
    • Types
    • Pointers and arrays
    • Structure and unions
    • Expressions
    • Conditional and iterative structures
    • Functions
    • Memory Management
    • Error handling
    • Standard Libraries
  • Secure C++
    • Declarations and Initialization
    • Expressions
    • Integers
    • Containers
    • Characters and Strings
    • Memory Management
    • Input Output
    • Exceptions and Error Handling
    • Object Oriented Programming
    • Concurrency
    • Miscellaneous
Exercise:  Debugging memory problems
  • Development environment
  • Libraries
  • Language generalities
  • Memory management
  • Type system
  • Foreign function interface (FFI)
  • Recommendations
  • Threat modelling
    • Introduction to threat modeling
    • Example threat models
  • Risk analysis
  • Software Assurance Maturity Model (SAMM)
  • Platform Security architecture (PSA)
  • Frameworks and Standards
    • NIST SP 800-160: Developing Cyber-Resilient Systems
    • ISO/SAE 214341: Road vehicles & Cybersecurity engineering
    • ISO/IEC 15408: Security, cybersecurity and privacy protection
    • IEC 651508: Functional Safety of electrical/electronic/programmable electronic safety-related systems
    • UL 2900-2-2: Software cybersecurity for network-connectable products
  • Security Knowledge Framework and Certifications
  • Introduction
  • Security Testing
    • Penetration testing
    • Vulnerability scanning
    • Risk assessment
    • Static Analysis
    • Dynamic analysis
    • Protocol fuzzing
  • Security provisioning
    • Security configuration management
    • Identity and access management
    • Incident response and management
    • Compliance and regulatory requirements
  • Security Testing Tools overview
  • Overview of cryptography
  • Classic Cryptography
  • Information assurance
  • Symmetric encryption
  • Asymmetric encryption
  • Random number generation
  • Integrity and authentication
  • Access authentication
  • Elliptic Curve cryptography
  • Certificates and Public Key infrastructures
  • Rules and recommendations
Exercise:  Encryption/Decryption
Exercise:  Private/Public Keys
Exercise:  Authentication and Integrity on IoT Devices
  • Crypto-Accelerator Overview
  • ARM TrustZone
  • Intel Software Guard eXtensions
  • SoC Security overview
    • Memory Protection
    • Trusted Boot and Firmware update overview
    • Secure Elements
    • Trusted Platform Module (TPM)
    • Hardware Security Module (HSM)
Exercise:  Secure boot
Exercise:  ARM TrustZone application (secure/non secure)
  • Introduction
  • Transport Layer Security (TLS)
  • IPsec/IKE
  • Network layer
    • Bluetooth
    • WiFi
    • 5G
    • NFC
    • RFID
    • SigFox
  • Secured IoT architecture
  • IoT standard and recommendations
  • Software development architecture and practices
  • Cryptology
  • Software security
  • Hardware protection
  • Network security
  • Life cycle and support