Lintopdrachten overslaan
Verdergaan naar hoofdinhoud

The Art of Fault Injection (TAoFI)

Algemeen

Fault Injection is often the weapon of choice for breaking into devices when exploitable software vulnerabilities are not known or absent. While Fault Injection attacks are nowadays common, typical concepts, methodologies, techniques, and attacks are often not sufficiently understood. While achieving success by simply glitching a target can yield results, it’s important to note that this approach alone doesn’t facilitate the creation of innovative attacks. In this training, students will experience and appreciate the Art of Fault Injection (TAoFI) to exploit the full potential of Fault Injection attacks.

Voor wie

Politiemedewerkers die werkzaam zijn binnen en ervaring hebben met het digitale werkveld van TDO of Digit en specialist zijn binnen de gebieden van embedded en/of mobile en/of encryption.

Opbouw

  • You will be using advanced techniques to characterize the effects of voltage glitches on the Espressif ESP32 System-on-Chip (SoC). The faults resulting from these voltage glitches are carefully analysed and de- scribed to build a thorough understanding of the target’s susceptibility to voltage glitches. This enables you to create powerful Fault Injection exploits.
  • During this training, rather than focusing on a specific set of tools, you will focus more on the concepts, methodologies, techniques, and attacks relevant to Fault Injection attacks.
  • You will experience, with guidance from experts, performing real-world Fault Injection attacks, that were either disclosed by Raelize or other security researchers.
  • You will be using the NewAE ChipWhisperer-Husky, typical hardware lab tooling like an oscilloscope and a hardware debugger.
  • You are provided with a virtual machine (VM) with all the required tooling installed, as well as access to the required hardware.
  • Upon completing the training, you will be proficient in executing sophisticated Fault Injection attacks on real-world targets using commercially available tooling. The knowledge gained from understanding the underlying concepts, methodologies, techniques, and attacks, can be used to perform novel Fault Injection attacks on other targets of interest.

Resultaat

The key learning objectives of this training are:

  • Understand Fault Injection techniques and attacks like an expert
  • Identify non-trivial vulnerabilities using advanced Fault Injection techniques
  • Create advanced Fault Injection exploits using commercially available tooling
  • Reproduce top-notch security research originally performed by Fault Injection experts

Praktische informatie

Code: 1900242.000
Type: Training
Examineringtype: Geen

Studielast totaal: 32 sbu
Instituut: 32 sbu

Duur: < 1 week
Totaalprijs: niet individueel afneembaar

Toelichting studielast

De training wordt gevolgd bij het NFI en bedraagt 4 dagen van 8 uur waarbij de verhouding ligt van 30% theorie en 70% hands-on excercises.

Overige informatie

This training starts by building up a solid understanding of the typical concepts and methodologies Fault Injection. Then, you dive straight into the advanced techniques and attacks, which are used to create powerful Fault Injection exploits. Throughout the training, there will be ample opportunity to discuss any relevant topic related to Fault Injection attacks and techniques.

Randvoorwaarden

You are expected to bring a modern laptop or workstation:

  • with sufficient memory (at least 8 GB)
  • with at least four (4) available USB-A ports (i.e., use a USB hub)
  • Raelize will have extra USB hubs available during the training (USB-C / USB-A)
  • installed with a modern browser (i.e., Google Chrome)
  • installed with VMware Player/Workstation (or VirtualBox)

Algemene instroomeisen

You are expected to:

  • have experience performing basic Fault Injection attacks
  • be familiar with communicating with embedded devices
  • be familiar with typical hardware lab tooling
  • be familiar with programming Python and C
  • be familiar with reverse engineering software
  • be familiar with common cryptography (RSA, AES, and SHA)

Vrijstellingen

Lees de algemene informatie over vrijstelling op basis van EVC.

Aanmelden

Ben je werkzaam bij de politie? In overleg met je leidinggevende, meld je aan in Youforce Opleidingsmanagement (YOM). Is er geen geschikte startdatum beschikbaar? Plaats jezelf dan op de wachtlijst. Je ontvangt een mailbericht als er nieuwe startdata beschikbaar zijn.

Ben je nog niet werkzaam bij de politie? Kijk dan op kombijdepolitie.nl of neem contact op met Team Recruitment van de politie via info@kombijdepolitie.nl of 088 6622300.

Meer weten?

Ben je werkzaam bij de politie en heb je een vraag over de planning van een opleiding? Stel deze dan bij je leidinggevende.