The three-day training course will provide security experts with an in-depth understanding of the security challenges and attack vectors associated with the eSIM technology stack.
The course will explore the attack surfaces of eSIM itself in both mobile and desktop environments, secure deployment practices, and local attack vectors.
Furthermore it will outline the offensive uses in red-teaming operations, potential fraud scenarios, and novel security challenges that eSIM might enable.
Morning Session
Introduction to eSIM/eUICC Technology
GSMA Security Standards and Effectiveness
eSIM Architecture and Components
Afternoon Session
Secure Deployment of eSIM Profiles
Morning Session
Attack Surface Analysis in Mobile Systems
Attack Surface Analysis in Desktop Systems
Afternoon Session
Local Attack Vectors in Desktop Environments
Morning Session
eSIMs in Offensive Red-Teaming Operations
Bypassing Traditional Security Measures
Afternoon Session
Hands-on Red-Teaming Exercises
Summary and Best Practices
The training is aimed at security engineers, security researchers, and developers with experience in mobile network and/or device security.
Required hardware:
By the end of this three-day training course, participants will have gained a comprehensive understanding of the security implications of eSIM/eUICC technology
They will have the ability to identify and mitigate potential vulnerabilities, and the skills to use eSIMs in offensive security operations. The course aims to inspire proactive approaches to securing eSIM technology, ultimately promoting a more secure and connected world.