Next Session: SOPHIA ANTIPOLIS –  Dates to be confirmed:

  • April 2018: 16th, 17th & 18th
  • May 2018: 16th, 17th & 18th

Title: Hands-on training

Topics covered: Reverse engineering techniques & hardware attacks

+ 1 day in the lab for a demo of depackaging, delayering and imagery of a chip

Next Training sessions:

Recon Montreal: 13th & 14th June 2018

Black Hat USA: Aug 2018 – 2 sessions ( 4th & 5th / 6th & 7th)

=> Contact us for an Onsite Training organized for you in your premises!



The primary goal of our trainings is to provide security professionals and team leaders the skills, mindset and background information necessary to successfully perform analysis of Integrated Circuits (ICs) and evaluate the efficiency of the existing counter-measures.

It is designed to give to Integrated Circuit professionals a deep understanding of the complete Reverse-Engineering and Attack chain to help them build more secure designs but also to give to newcomers a detailed overview for a fast ramp-up.

Students who complete this course become familiar with all important classes of low-level hardware attacks (shield and hardware counter-measures bypass – ROM and Flash/EEPROM dump – bus passive and active probing – …) through real world examples covering the entire analysis workflow from the lab to the data analysis.

The training describes modern analysis methods involving automation and discuss the efficiency of modern counter-measures in such a context.


Tens of attendees have followed our trainings, wether it was a hands-on, an onsite or in great conferences such as Black Hat, Recon or Hardwear.io.

Here are some of the feedbacks that we had from them:

“I had doubts on the fact that IC Reverse Engineering was possible. Now I know.”

“The course gives great insights about the IC’s internal.”

“Assignment book is great material.”

“The training on IC RE was very good. Overall, Mr Thomas’ presentation was well adapted to the audience.”

“Overall a very good course. I learned a lot. Would definitely recommend.”

“Very knowledgeable in IC security. Would definitely take a second level course taught by Olivier Thomas.”