A study and application of how low-level hardware and software can be exploited and defended. The architecture of devices and systems for resiliency. The use of secure coding and defense against counterfeiting devices.
The learning objectives are to evaluate the resilience, risk, and survivability of a deviceâ€™s coding and architecture, design devices using resilience architecture and coding tactics, techniques, and procedures, e.g. MITRE ATT&CK, and design monitoring features into devices to detect abnormalities.