Advanced Embedded Systems Security

Advanced Embedded Systems Security online course

Advanced Embedded Systems Security


30-31 March 2023 / Online course
Ask for price

Request more information

Lena Bernhardsson
+46 (0) 40 59 22 09

In this course you will learn how to secure your embedded system. You will learn how to protect your program from malicious user input. You will also understand the use of hypervisors and virtualization of the system, and discover controls and tools for embedded security. You will also have hands-on exercises with topics such as memory protection unit (MPU) and secure boot. 


Advanced Embedded Systems Security – course training format:

  • Online training: 2 days, 6 hours/ day 
  • The course is organized via MS Teams video meeting 
  • PDF course material (in English) 
  • The course includes hands-on excercices

Advanced Embedded Systems Security – course objectives: 

  • How to manipulate files and directories in a secure manner 
  • Discover how to protect your programs from malicious user input 
  • Secure System Software Consideration 
  • Embedded system hardware features for security 
  • Secure Software Development methodology and framework 
  • Apprehend the context and the use of Hypervisors and System Virtualization 
  • Discover Security checks and Tools 


Practical activities 

  • Practical activities represent from 40% to 50% of course duration 
  • One Online Linux PC per trainee for the practical activities 
  • The trainer has access to trainees’ Online PCs for technical and pedagogical assistance 
  • Downloadable preconfigured virtual machine for post-course practical activities 


  • Some programming concepts are desirable (any language) 
  • Some cryptography and Linux basics


Day 1 Day 2
System Software Consideration 


  • The Operating System 
  • Multiple Independent Levels of Security 
  • Information Flow 
  • Data Isolation 
  • Damage Limitation 
  • Periods Processing 
  • Tamper Proof 
  • Evaluable 
  • Core embedded Operating system Security Requirements 
  • Memory Protection 
  • Virtual Memory 
  • Guard Pages 
  • Location obfuscation 
  • Fault Recovery 
  • Impact of Determinism 
  • Secure Scheduling 
  • Hypervisors and System Virtualization 
  • Introduction to System Virtualization 
  • Applications of System Virtualization 
  • Environment Sandboxing 
  • Virtual Security Appliances 
  • Hypervisor Architectures 
  • Paravirtualization 
  • Leveraging Hardware Assists for Virtualization 
  • ARM TrustZone 
  • Hypervisor Security 
  • I/O Virtualization 
  • Remote Management 
  • Assuring Integrity of the TCB 
  • Trusted Hardware and Supply Chain 
  • Secure Boot 
  • Static versus Dynamic Root of Trust 
  • Remote Attestation 


Exercise: Memory Protection (MPU) 

Exercise: ARM TrustZone 

Exercise: Secure Boot 

Data Protection Protocols for Embedded Systems 


  • Data-in-Motion Protocols 
  • Generalized Model 
  • Choosing the Network Layer for Security 
  • Ethernet Security Protocols 
  • IPsec versus SSL 
  • IPsec 
  • SSL/TLS 
  • Embedded VPN Clients 
  • DTLS 
  • SSH 
  • Custom Network Security Protocols 
  • Secure Multimedia Protocols 
  • Broadcast Security 
  • Data-at-Rest Protocols 
  • Choosing the Storage Layer for Security 
  • Symmetric Encryption Algorithm Selection 
  • Managing the Storage Encryption Key 


Testing for Security 


  • Basic Testing Methods 
  • White-Box Testing 
  • Black-Box Testing 
  • Grey-Box Testing 
  • Fuzz-Testing 

Do you wish more information!

Contact us for offers, information or advice!