Applied Physical Attacks on x86 Systems - for FREE

Wednesday, 4 May 2016 9:00 AM - Thursday, 5 May 2016 5:00 PM PST

7614 N Interstate Ave, Portland, OR, 97217, United States

Register Now

Registration

Sale ended

Attendee - $20 will reserve your space and be refunded Partial Approval - $20.00

$20 refundable fee is to hold your space. You'll get your $20 back as long as you show up, and promise me you were laid off from Intel.

Sale ended

Pitch in for lunch or equipment expenses

Sale ends on 05/04/2016

If you would like to pitch in, whether you're attending or not, I hope to provide lunch, cover my equipment expenses, and make a donation to Ctrl-H for use of their space with these funds.

Enter your discount code

  • Subtotal (excluding fees and discounts)
  • Fee
  • Total amount

1. Select Seats

2. Review and Proceed

Wednesday, 4 May 2016 9:00 AM - Thursday, 5 May 2016 5:00 PM PST

Ctrl-H Craft Lab, 7614 N Interstate Ave, Portland, OR, 97217, United States.

Before starting my training business in 2012, I had worked at Intel in Hillsboro for 8 years. For all of my former coworkers who were recently laid off, I'd like to offer my class, Applied Physical Attacks on x86 Systems, for FREE. Some might find it helps them pivot their hardware validation skills to hardware security. Others might find it helpful to brush up on hardware security as they prepare to interview elsewhere. Some might just need something to occupy some newfound free time. 

I can only accomodate about 20 people, so I am asking for a refundable $20 registration to hold your space. You'll get your $20 back when you show up, and promise me you were in fact laid off from intel.

If you're gainfully employed but still interested in the class, please check out my paid offerings:

Portland, October 10-13th

Black Hat, July 30- August 2nd

This course introduces and explores attacks on several different relatively accessible interfaces on x86 systems. Attendees will get hands-on experience implementing and deploying a number of low-cost hardware devices to enable access, privilege, and deception which is in some cases imperceptible from software.

The course has several modules. Each begins with an architectural overview of an interface, and follows with a series of labs for hands-on practice understanding, observing, interacting with, and exploiting the interface, finishing with either potentially exploitable crashes or directly to root shells.

Familiarity with linux command lines and low level programming languages is helpful to get the most out of this class, though not 100% essential.

For full details and a course outline, see https://securinghardware.com/course-catalog/pax/

This public class will span 2 days and will be held the Craft Lab at CTRL-H in Portland, OR: http://pdxhackerspace.org/

Contact info@securinghardware.com if you have any questions, if you're interested in other classes, or you'd like to schedule a private class.

Joseph FitzPatrick

https://securinghardware.com

There is far too much hardware security work to be done by the small pool of hardware security experts. To meet that need, SecuringHardware.com offers courses, workshops, and curriculum to help introduce and ramp existing software security experts and hardware validation experts into the field of hardware security.

Contact the Organizer View other events