Day 1:
-
- US Food Drug Administration Cybersecurity Premarket Guidance and approval process (medical device security requirements)
- Common medical device architectures
- BTLE
- Wireless
- Cellular
- Custom Radio
- Common medical device networks and risks
- Historical attacks against medical devices and hospital networks
- Common medical device security testing approaches and vulnerability identification
- Medical device teardown, anti-tamper, depotting techniques and hardware photography
- Medical device disassembly
- Identifying and defeating anti-tamper
- Hot air depotting
- Chemical depotting
- PCB photography, PCB delayering techniques and PCB layer stitching
- PCB and medical device hardware reverse engineering
- Integrated circuit (IC) component identification and datasheet analysis
- PCB photography reverse engineering
- Multimeter contract tracing
- Patient peripheral and drug distribution mechanism reverse engineering
- Identification of debugging interfaces (UART, JTAG, SWD, USB)
- Identification of flash, persistent storage and potential firmware extraction techniques
- Signal Analysis
- SPI
- UART
- I2C
- Firmware extraction
- SPI flash
- UART
- Uboot
- Over the air (OTA)
- JTAG/SWD
Day 2:
-
-
- Cryptology basics
- Cryptography
- Cryptanalysis
- FDA and NIST medical device requirements
- Wireless analysis and Attacks
- Bluetooth low energy (BLE)
- WiFi
- Cellular
- Custom radio frequencies
- Mobile application analysis
- Web application and cloud analysis
- Medical device kiosk modes and kiosk escapes
- Source code vulnerability analysis techniques
- Sinks, sources, intersection graphs, filters, transformations
- Manual vulnerability analysis
- Common vulnerabilities
- Buffer overflow
- Heap overflow
- Use after free (UAF)
- Double free
- Null pointer dereference
- Command injection
- Authentication bypass
- Authorization issues
- Weak or insufficient cryptography
- Hard coded credentials/secrets
- Exposed logging or debugging
- Timing attacks
- Misconfigurations
- Outdated dependencies
- etc.
- Automated vulnerability analysis
- Semgrep usage and custom rule writing
- Cppcheck/Cppcheck-gui
- Bandit
- Cryptology basics
-
Day 3:
-
- Firmware analysis
- Binary analysis
- Fuzzing and crash triage
- Exploit, proof of vulnerability (PoV) and proof of concept (PoC) development
- Medical device supply chain security
- PCB fabrication security
- Assembly and firmware flashing security
- Anti-counterfeiting measures and hostile supply chain considerations
- Medical device defensive hardware design considerations
- Defensive coding and fixing security issues
- Bug bounty and security reporting tips