Chat with us, powered by LiveChat

IC REVERSE ENGINEERING & DATA EXTRACTION TRAININGS

WE ARE HAPPY TO WELCOME YOU AGAIN, SAFELY, TO OUR HANDS-ON SESSION IN SOPHIA ANTIPOLIS

Attend our hands-on training and discover how we open chips in our lab and how we do extract data from them TOPICS COVERED: IC Reverse Engineering & Memories Extraction techniques & hardware attacks

REGISTER FOR ONE OF OUR NEXT SESSIONS: Hands-on Training @Texplained: 18-20 May 2021  

=> This session is already almost complete. Please contact us rapidly if you wish to book a seat!

  Contact us to attend or to know the dates of the following sessions  


TEXPLAINED TRAININGS IN YOUR PREMISES => Contact us for an Onsite Training organized for you in your premises!

TEXPLAINED TRAININGS AT CONFERENCES  

IC Reverse Engineering & Code Dump By Olivier Thomas  

REGISTER TO OUR VIRTUAL TRAININGS HERE:

Hardwear.io: 4-days session – 26th to 29th April 2021

HiTB: 2-days session 25 & 26th May 2021      


CUSTOMIZE YOUR TRAINING

IC REVERSE ENGINEERING & CODE DUMP     //     From 2- to 5-DAYS SESSION

Modulate your session by assembling all or some of the following topics:

  • Theory: introduction on digital electronics and deprocessing techniques
  • Lab: Depackaging / Deprocessing / Imagery
  • ChipJuice: Image processing and Netlist Extraction
  • Theory : IC Reverse Engineering and attacks techniques

“The primary goal of this training is to provide Digital Forensics & Security Professionals as well as Government Services the skills, mindset and background information necessary to successfully:

  • Recover ICs internal architectures
  • Evaluate the efficiency of existing countermeasures
  • Extract NVMs contents (ROM & Flash), in order to analyze and evaluate the security of the embedded firmware, and extract secret informations

The Students will be shown how such informations can be used to define easier methods to find / exploit firmware + hardware weaknesses for vulnerability analysis as well as for embedded evidence extraction purposes.    

OUR TRAINERS

ABOUT OUR TRAINING SESSIONS

The primary goal of our trainings is to provide security professionals and team leaders the skills, mindset and background information necessary to successfully perform analysis of Integrated Circuits (ICs) and evaluate the efficiency of the existing counter-measures. It is designed to give to Integrated Circuit professionals a deep understanding of the complete Reverse-Engineering and Attack chain to help them build more secure designs but also to give to newcomers a detailed overview for a fast ramp-up. Students who complete this course become familiar with all important classes of low-level hardware attacks (shield and hardware counter-measures bypass – ROM and Flash/EEPROM dump – bus passive and active probing – …) through real world examples covering the entire analysis workflow from the lab to the data analysis. The training describes modern analysis methods involving automation and discuss the efficiency of modern counter-measures in such a context.

TRAINING SESSION TESTIMONY

Tens of attendees have followed our trainings, wether it was a hands-on, an onsite or in great conferences such as Black Hat, Recon or Hardwear.io. Here are some of the feedbacks that we had from them:

“I had doubts on the fact that IC Reverse Engineering was possible. Now I know.”

“The course gives great insights about the IC’s internal.”

“Assignment book is great material.”

“The training on IC RE was very good. Overall, Mr Thomas’ presentation was well adapted to the audience.”

“Overall a very good course. I learned a lot. Would definitely recommend.”

“Very knowledgeable in IC security. Would definitely take a second level course taught by Olivier Thomas.”