Side-Channel Attacks, Fault Injection, and Glitching
RCCE students will learn advanced hardware attack techniques that exploit timing, power, electromagnetic leakage, voltage manipulation, and transient faults to bypass security mechanisms. RCCE students will learn to understand side-channel data leakage, recognize fault injection opportunities, evaluate tamper resistance claims, and assess the real-world limits of hardware-assisted protection in high-value targets. The course covers practical scenarios ranging from timing leakage analysis to glitch-based bypass techniques and defensive countermeasures. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Side-Channel Attacks, Fault Injection, and Glitching
- Explain Course Overview and Learning Objectives fundamentals
- Execute hands-on tasks for course focus
- Execute hands-on tasks for learning outcomes — covering Analyze timing and power leakage.
- Execute hands-on tasks for side-channel attack taxonomy
- Execute hands-on tasks for timing attacks
- Execute hands-on tasks for power analysis — covering execution time.
- Execute hands-on tasks for em emanation — covering execution time.
- Execute hands-on tasks for evict+time — covering Simple Power Analysis (SPA).
- Execute hands-on tasks for how side channels leak data
- Execute hands-on tasks for sensitive input
- Execute hands-on tasks for processing unit
- Execute hands-on tasks for key principle — covering Every computation consumes resources.
| Module 01 | Course Overview and Learning Objectives |
| Module 02 | Course Focus |
| Module 03 | Learning Outcomes |
| Module 04 | Side-Channel Attack Taxonomy |
| Module 05 | Timing Attacks |
| Module 06 | Power Analysis |
| Module 07 | EM Emanation |
| Module 08 | Evict+Time |
| Module 09 | How Side Channels Leak Data |
| Module 10 | Sensitive Input |
| Module 11 | Processing Unit |
| Module 12 | Key Principle |
| Module 13 | Attacker Requirements |
| Module 14 | Timing Side-Channel Attacks |
All hands-on labs run on Rocheston Rose X OS. Students practice side-channel attacks, fault injection, and glitching by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Course Overview and Learning Objectives fundamentals
- Lab 2: Execute hands-on tasks for course focus
- Lab 3: Execute hands-on tasks for learning outcomes
- Lab 4: Execute hands-on tasks for side-channel attack taxonomy
- Lab 5: Execute hands-on tasks for timing attacks
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Side-Channel Attacks, Fault Injection, and Glitching, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI