"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."<br /><b>—Yifan Lu, Security Researcher<br /><br /></b>"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."<b><br />—Arya Voronova, Hackaday</b>
The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.
Les mer
Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
IntroductionChapter 1: Dental Hygiene: Introduction to Embedded SecurityChapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral InterfacesChapter 3: Casing the Joint: Identifying Components and Gathering InformationChapter 4: Bull in a China Shop: Introducing Fault InjectionChapter 5: Don’t Lick the Probe: How to Inject FaultsChapter 6: Bench Time: Fault Injection LabChapter 7: X Marks the Spot: EMFI Memory Dumping of TrezorChapter 8: I’ve Got the Power: Introduction to Power AnalysisChapter 9: Bench Time: Simple Power AnalysisChapter 10: Splitting the Difference: Differential Power AnalysisChapter 11: Advanced Power AnalysisChapter 12: A DPA/SCA Lab: Breaking an AES-256 BootloaderChapter 13: No Kiddin’: Real-Life ExamplesChapter 14: Think of the Children: Countermeasures, Certifications, and GoodbytesAppendix A: Maxing Out Your Credit Card: Setting Up a Test LabAppendix B: All Your Base Are Belong to Us: Popular Pinouts
Les mer
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."—Yifan Lu, Security Researcher"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."—Arya Voronova, Hackaday
Les mer
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.
Les mer
Produktdetaljer
ISBN
9781593278748
Publisert
2021
Utgiver
Vendor
No Starch Press,US
Høyde
234 mm
Bredde
179 mm
Aldersnivå
G, 01
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
512
Biographical note
Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.