What is the Keysight Device Security Workshop?

The Keysight Device Security Workshop is designed to bring together security professionals, researchers, and engineers to share the latest updates in the embedded security space. Our goal is to engage with current and future users of our Inspector toolset, providing hands-on demonstrations of our hardware and software solutions.

Final Stop of 2025: Kuala Lumpur, Malaysia

After 8 successful workshops around the world this year, our final stop brings us to Kuala Lumpur, Malaysia for a dynamic workshop with extensive embedded security engagement. From September 14 to September 19, we'll be at the Kuala Lumpur Convention Centre, with our presence spanning multiple events.

Here's what we have planned:

  • September 14: We’ll kick things off as sponsors of FDTC 2025 (Fault Diagnosis and Tolerance in Cryptography), an affiliated event of CHES 2025.
  • September 15–18: We’ll be at CHES 2025 as a Gold Sponsor. Visit us at the entrance area to explore the latest in embedded security. BONUS: A special surprise awaits!
  • September 19: We’ll host the Keysight Device Security Workshop at the Kuala Lumpur Convention Centre (same venue as CHES). This in-depth session will cover cutting-edge topics including AI , Post-Quantum Cryptography (PQC), pre-silicon security testing, the next generation of security testbenches and more

It’s the perfect opportunity to gain specialized insights into cryptographic hardware and embedded systems. Join our workshop and learn directly from our team of experts.

A picture of the participants of our workshop in Delft
workshoplocations

Device Security Workshops 2025 are wrapping up!
Out of 9 global locations, 8 Device Security workshops and training sessions have already taken place. Now, we’re heading into the final stop of the year, Kuala Lumpur, Malaysia!

LOCATION & DATE

Kuala Lumpur, Malaysia: September 19 (After CHES2025)
 

VENUE INFORMATION

Workshop day:

Kuala Lumpur Convention Centre, Meeting Room 302&303, Level 3​

 

Workshop Agenda

 

 

Start time

Session title

8:30am - 9:00am

-- Registration / Coffee --

9:00am - 10:00am

What's Hot, What's Happened

 

During this 50-minute talk, Riscure founder Marc Witteman will share his thoughts on recent market developments and gives an insight on his expectations of trends that have a chance to become mainstream soon.

10:00am - 10:30am

Post Quantum Cryptography (PQC)

 

Development of PQC implementations is a necessity nowadays. Usage of PQC algorithms is for example mandated by the US government. In this session we will cover the state-of-the art regarding Post Quantum market developments and will cover side channel and fault injection vulnerabilities for various ciphers: Dilithium, Kyber, XMSS and LMS. Leakage assessment (TVLA) for ciphers using transformations in NTT domain. 

10:30am - 10:45am

-- Morning Coffee & Snack Break --

10:45am - 11:30am

Inspector Update - Next Generation Workstation (PXI)

 

The latest Inspector developments are discussed and demonstrated in this session. Next to that we will present the next generation embedded security testbench. This development of security test devices based on Keysight PXI products will deliver a boost in performance, additional capabilities, and improved user experience. We will cover what is available today and what our roadmap is.

11:30am - - 12:00pm

Automotive - Achieving UN-R155 and 156 Type Approval: Real-World Experiences and Best Practices.

In this session we will cover in what way security labs approach a security evaluation project for a vehicle. We will give insights on the process a typical security lab will follow and though the examples we cover are focused on the automotive industry, concepts can be applied to testing of any other product.

12:00pm - 1:00pm -- Lunch Break --

1:00pm - 1:45pm

Invited Speaker (See each location for invited speaker information)

1:45pm - 2:30pm

Artificial Intelligence

 

We already presented the benefits of using AI to improve FI and SCA test scenarios. For both scenarios Inspector offers modules you can benefit from. Lately though, we see more publications on using SCA and FI to attack AI chips to extract secrets, mostly the configuration of trained networks. In this session, we will explain how these attacks work and what attackers can gain. Next to that we will also explain how FI can be used to influence the outcome of decisions from AI networks.

2:30pm - 2:45pm -- Afternoon Snack Break --
2:45pm - 3:15pm

OCP Safe

We'll provide insights into the Open Compute Poject (OCP) Security and Compliance Framework, including the OCP Security Appraisal Framework (OCP SAFE), and how your company can align with these standards to enhance hardware security and resilience. Additionally, we'll explore the evolving securiting landscape of hyperscalers and data centers, discussing the unique challenges in securing large-scale infrastructure, mitigating emerging threats, and implementeing robust hardware and firmware protections. We will also highlight some attacks that can be categorized as remote SCA or FI.

3:15pm - 3:45pm

Pre-Silicon

We achieved breakthroughs in identifying leakage and root cause in a protected AES implementation. Results from pre-silicon testing correlated extremely well with test results from physical testing on a FPGA. We will provide details on the appraoch and gains to achieve with this emerging technology.

3:45pm - 4:15pm

RED Certification

We explain how medium assurance product certification like RED can be achieved through chip certification based on the SESIP or ARM PSA schemes. This will leverage the efforts of chip vendors to provide security assurance and enable product vendors to acquire a RED certificate quickly.

4:15pm - 4:45pm

Screaming Channels

Mixed signal chips can be vulnerable for SCA attacks, leaking secret information from cryptographic operation through a modulated signal over a transmitted carrier wave: WIFI, Bluetooth and now cellular. We will go into the details on how this remote SCA attacks works and demonstrate how we were able to find leakage in transmitted cellular signals. For this attack we used several security test devices and Inspector software in combination with Keysight dedicated 5G test equipment.

4:45pm - 5:00pm  -- Closing & Lucky Draw -- 

Register for your preferred workshop location by filling out the form below, please also indicate if you would like to participate in one of the Training Days.

Have questions or need help?