partner-offering-banner.png

FPGA Security Bootcamp

HandsOn-Training

Select

FPGA security becomes an issue because adversaries can reverse engineer FPGA design to steal valuable IP information, obtain decrypted FPGA bitstream by wire-tap, clone FPGAs/IPs and sell them , use replay attack on the previous system version with vulnerabilities, conduct remote side channel attacks without physical access (cloud, data center, SoC), attack hardware by software and software by hardware , insert hardware Trojan as a backdoor , and cause denial of service. This training provides all necessary theoretical and practical know-how to secure modern SoC FPGA-based systems, and help customers not just to understand the concepts but also how to implement and integrate them into their project. The training starts by introducing the main security threats that may be encountered by application designers when working on FPGA. The training continues by describing the security building blocks currently provided by the Altera, and the role of each one of them.

FPGA security becomes an issue because adversaries can reverse engineer FPGA design to steal valuable IP information, obtain decrypted FPGA bitstream by wire-tap, clone FPGAs/IPs and sell them , use replay attack on the previous system version with vulnerabilities, conduct remote side channel attacks without physical access (cloud, data center, SoC), attack hardware by software and software by hardware , insert hardware Trojan as a backdoor , and cause denial of service. This training provides all necessary theoretical and practical know-how to secure modern SoC FPGA-based systems, and help customers not just to understand the concepts but also how to implement and integrate them into their project. The training starts by introducing the main security threats that may be encountered by application designers when working on FPGA. The training continues by describing the security building blocks currently provided by the Altera, and the role of each one of them.

Key Features

  • The only FPGA security training which combines Arm Cortex-A security deep know-how, FPGA design, and security for Embedded systems (hacking and defending). Very structured training for FPGA designers without security background or expereince. Modern FPGA

Offering Brief

Offering Brief

Device Family Arria® 10 SX SoC FPGA, Cyclone® IV GX FPGA, Agilex® 5 FPGAs and SoC FPGAs E-Series, MAX® 10 FPGA, Cyclone® V SX SoC FPGA, Arria® V GZ FPGA, Agilex® 9 FPGAs and SoC FPGAs Direct RF-Series, MAX® V CPLD, Agilex® 7 FPGAs and SoC FPGAs I-Series, Arria® V SX SoC FPGA, Stratix® 10 DX FPGA, Stratix® 10 SX SoC FPGA, Agilex® 7 FPGAs and SoC FPGAs M-Series, Cyclone® V GT FPGA, Arria® 10 GT FPGA, Arria® V ST SoC FPGA, Arria® 10 GX FPGA, Stratix® 10 TX FPGA, Cyclone® V SE SoC FPGA, Stratix® IV E FPGA, Stratix® IV GX FPGA, Arria® V GX FPGA, Cyclone® V E FPGA, Agilex® 3 FPGAs and SoC FPGAs C-Series, Cyclone® V GX FPGA, Stratix® V GS FPGA, Stratix® V GX FPGA, Cyclone® V ST SoC FPGA, Agilex® 5 FPGAs and SoC FPGAs D-Series, Stratix® 10 GX FPGA, Arria® V GT FPGA, Cyclone® 10 LP FPGA, Agilex® 7 FPGAs and SoC FPGAs F-Series, Cyclone® 10 GX FPGA, Stratix® 10 AX SoC FPGA, Cyclone® IV E FPGA, Stratix® III FPGA
Offering Status Production
Prerequisites Embedded systems design
Languages English
Target Audience FPGA, embedded software and system engineers
Hands On Lab False

Course book and labs source files and solutions

Documentation & Resources

Market Segment and Sub-Segments