Wednesday 19 December 2018

Developing & Delivering KnowHow

Home > Events > Embedded KnowHow Workshops

1 Day Hands-On Training in Embedded Linux / Security

Register Now10am - 5pm | Thursday Sept 27, 2018
Green Park, Reading, UK | Cost £99* + vat

*Regular cost for this training £699 - Save £600!

Overview

Attend our unique Embedded KnowHow Workshops this September and get valuable hands-on training that will help you in your next Embedded Linux or Embedded Security project.

Choose from 2 streams of workshops:

Stream 1: Embedded Linux

Stream 2: Embedded Security

FULLY BOOKED - WAITING LIST ONLY BOOKING FAST: LIMITED AVAILABLITY

Morning:

Anatomy of an Embedded Linux System
Yocto Kick-Start

Afternoon:

Linux User / Kernel Debug
Trace & Profile

View full details below

Morning:

Common Attacks
and Mitigations

Afternoon:

Coding Standards & Defensive Programming
Secure Software Development Lifecycle

View full details below

Who should attend & Pre-requisites

This event is for embedded engineers looking for a practical introduction to these key Embedded Linux and Security topics.

Minimal knowledge of the topic areas will be sufficient to attend the workshops.

What will I learn?

Each stream contains a combination of presentations and practical exercises as follows:

Stream 1: Embedded Linux

Anatomy of  an Embedded  Linux System:

TuxPresentation 1:
In this session we cover each of the components required for Linux to work on an embedded system (i.e. the Linux kernel, toolchain, bootloader, filesystem). We will review how each of these components fit into the system and what functionality they provide for development and in the final deployed product. We will review some of the choice that can be made, looking at what options there are for creating an integrated development environment for embedded Linux.

Practical 1:
In the first practical we will boot the target board and communicate with it via the serial console and the ethernet connection. We'll see how graphical applications can be used via SSH X forwarding.

Yocto Kick-Start

Presentation 2:
We explore how a minimal Linux system can be extended to include custom, packaged software. We demonstrate how standard Linux tools drop out of the build system and can be used in a stand-alone SDK. In the process, key concepts of the Yocto Project build system such as recipes, tasks and layers will be introduced.

Practical 2 :
We can now use Yocto to build software for our target, adding a recipe for a new package and then testing that new application on the target.

Lunch (provided)

Linux User/Kernel Debug

Presentation 3:
An essential part of the process for developing embedded Linux systems is debugging. Whether to remove bugs or verify the behaviour of the system it is vital for developers to know how to debug their code running on a Linux target. We look closely at embedded Linux application & kernel debugging and review the different tools and methodologies available in a typical embedded Linux system.

Practical 3:
In the first part of the practical we can see how we can cross debug an application on our target. In the second part we can debug the kernel itself using KDB.

Trace & Profile

Presentation 4:
Linux provides a wide range of tracing and profiling tools which you can use to understand performance issues and also investigate bugs and unexpected behaviours. In this session we introduce some of the tools available in a typical embedded Linux system and show how they can be used to analyse the kernel, applications and the wider system helping you to optimise your products. We use real-life case studies and demos to show how they work in practice. 

Practical 4:
Now we can use some of the tracing and profiling tools to analysis the behaviour of user space and kernel space processes when carrying out basic operations such as reading a file.

Register Now

Organised in partnership with Electronics Weekly and kindly sponsored by Avnet Silica.


Stream 2: Embedded Security

Common Attacks and Mitigations

TuxPresentation 1:
This section introduces the most common vulnerabilities in embedded software and shows ways that you can protect your system against them. We will discuss fundamental software vulnerabilities, including security problems introduced during the design and implementation of software. This can lead to issues such as stack and heap attacks, string format attacks, integer overflow and memory management issues.

Practical 1:
In this exercise we will investigate how binary code is structured and also take a look at common vulnerabilities in applications written in C. We examine examples of common attacks like buffer overflow and command injection and see how to use debugging tools like GDB to analyse potential weaknesses.

Lunch (provided)

Coding Standards and  Defensive Programming

Presentation 2:
C is the most widely used programming language for embedded application. Although a powerful language, it is widely understood that this power has the downside that unsafe, insecure and unreliable code is all to easy to write. A good solution is to develop code that is compliant with an appropriate set of guidelines that help avoid the pitfalls. MISRA C and CERT C are two examples of such guidelines. In this presentation these two standards are introduced, compared and contrasted, so you have opportunity to make an informed choice for your specific project. Each of the two standards has some excellent characteristics, but every embedded project is different; one size does not fit all!

Secure Software Development Lifecycle

Presentation 3:
This session looks at the secure software security lifecycle, examining in detail how the SSDL process is structured and how the attack surface for a device can be defined. A process for modelling security threats is introduced and we can examine how to use this to define a security requirement.

Practical 3:
In this exercise a threat model is generated for an example embedded system (a set-top box), using the techniques described in the presentation.

Register Now
Organised in partnership with Electronics Weekly and kindly sponsored by Avnet Silica.



ABOUT DOULOS

Doulos has set the industry standard for developing and delivering high quality training and know-how in electronic system design and verification for 25 years, covering languages and methodologies for system, hardware, and embedded software designers. The essential choice for more than 3000 companies across over 60 countries, Doulos provides scheduled classes across North America, Europe and India, and delivers on-site, team-based training and interactive on-line learning events worldwide.

ABOUT ELECTRONICS WEEKLY

TuxElectronics Weekly is the market leading and longest-established electronics magazine, read in print and online by key decision makers throughout the industry for more than 50 years. Electronics Weekly is at the heart of the electronics industry and is reaching an audience of more than 120,000 people each month. It also organises the prestigious Elektra Awards.

KNOWHOW

Doulos is dedicated to providing engineers with useful technical information, models, guidelines, tips and downloads.

Check out these free KnowHow resources here »

Privacy Policy Site Map Contact Us
Visit the Doulos DAC Booth: 739 Avnet Silica Electronics Weekly