|Listed in category:
This listing was ended by the seller on Fri, 30 May at 6:15 PM because the item is no longer available.
Microcontroller Exploits
Ended
Microcontroller Exploits
US $19.39US $19.39
May 30, 18:15May 30, 18:15
Have one to sell?

Microcontroller Exploits

US $19.39
ApproximatelyS$ 24.92
Condition:
Brand New
6 available1 sold
    Shipping:
    Free Standard Shipping.
    Located in: Powder Springs, Georgia, United States
    Delivery:
    Estimated between Sat, 23 Aug and Wed, 27 Aug to 94104
    Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
    Returns:
    30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
    Coverage:
    Read item description or contact seller for details. See all detailsSee all details on coverage
    (Not eligible for eBay purchase protection programmes)
    Seller assumes all responsibility for this listing.
    eBay item number:335972569549

    Item specifics

    Condition
    Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
    Release Year
    2024
    Book Title
    Microcontroller Exploits
    ISBN
    9781718503885

    About this product

    Product Identifiers

    Publisher
    No Starch Press, Incorporated
    ISBN-10
    1718503881
    ISBN-13
    9781718503885
    eBay Product ID (ePID)
    22067507612

    Product Key Features

    Number of Pages
    408 Pages
    Publication Name
    Microcontroller Exploits
    Language
    English
    Subject
    Security / Cryptography, Mechanical, Electronics / Circuits / Integrated
    Publication Year
    2024
    Type
    Textbook
    Author
    Travis Goodspeed
    Subject Area
    Computers, Technology & Engineering
    Format
    Hardcover

    Dimensions

    Item Height
    1.1 in
    Item Weight
    28.3 Oz
    Item Length
    8.6 in
    Item Width
    6.3 in

    Additional Product Features

    Intended Audience
    Trade
    Reviews
    "Understanding the pitfalls of microcontroller security is hard, because there are many exquisite and obscure bits of knowledge that must all work together. Before this book, there was only one effective way to learn: talk to a master practitioner like Travis. This book gives a broad and deep survey of the craft, but most importantly it gets the many critical bits in one place, under one cover. I am sure it will become a foundation of many career-changing classes. One day I hope to get good enough to teach one!" --Sergey Bratus, Distinguished Professor in Cyber Security, Technology, and Society, Dartmouth College "We don't have many books focused on such a topic, but face security problems tied to hardware and specifically to microcontrollers every day. Travis's book is foundational to understanding the security problems and how the attackers are going to exploit them. This book is a must-read for every product security team involved in device security." -- Alex Matrosov, CEO and Founder of Binarly, "Understanding the pitfalls of microcontroller security is hard, because there are many exquisite and obscure bits of knowledge that must all work together. Before this book, there was only one effective way to learn: talk to a master practitioner like Travis. This book gives a broad and deep survey of the craft, but most importantly it gets the many critical bits in one place, under one cover. I am sure it will become a foundation of many career-changing classes. One day I hope to get good enough to teach one!" --Sergey Bratus, Distinguished Professor in Cyber Security, Technology, and Society, Dartmouth College
    Dewey Edition
    23
    Dewey Decimal
    006.22
    Table Of Content
    Introduction Chapter 1: Basics of Memory Extraction Chapter 2: STM32F217 DFU Exit Chapter 3: MD380 Null Pointer, DFU Chapter 4: LPC1343 Call Stack Chapter 5: Ledger Nano S, 0xF00DBABE Chapter 6: NipPEr Is a buTt liCkeR Chapter 7: RF 430 Backdoors Chapter 8: Basics of JTAG and ICSP Chapter 9: nRF51 Gadgets in ROM Chapter 10: STM32F0 SWD Word Leak Chapter 11: STM32F1 Interrupt Jigsaw Chapter 12: PIC18F452 ICSP and HID Chapter 13: Basics of Glitching Chapter 14: MC13224, the Simplest Fault Injection Chapter 15: LPC1114 Bootloader Glitch Chapter 16: nRF52 APPROTECT Glitch Chapter 17: STM32 FPB Glitch Chapter 18: Chip Decapsulation Chapter 19: PIC Ultraviolet Unlock Chapter 20: MSP430 Paparazzi Attack Chapter 21: CMOS VLSI Interlude Chapter 22: Mask ROM Photography Chapter 23: Game Boy Via ROM Chapter 24: Clipper Chip Diffusion ROM Chapter 25: Nintendo CIC and Clones Chapter A: More Bootloader Vulns Chapter B: More Debugger Attacks Chapter C: More Privilege Escalation Chapter D: More Invasive Attacks Chapter E: More Fault Injections Chapter F: More Test Modes Chapter G: More ROM Photography Chapter H: Unsorted Attacks Chapter I: Other Chips Thank you, kindly. Bibliography Index
    Synopsis
    Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities. In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction. You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book you'll find an encyclopedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security.
    LC Classification Number
    TJ223.P76G6 2024

    Item description from the seller

    About this seller

    Big River Books

    99.2% positive feedback1.0M items sold

    Joined Jan 2009
    Welcome to my eBay Store. Please add me to your list of favorite sellers and visit often. Thank you for your business.

    Detailed Seller Ratings

    Average for the last 12 months
    Accurate description
    4.9
    Reasonable shipping cost
    5.0
    Shipping speed
    5.0
    Communication
    4.9

    Popular categories from this store

    Seller feedback (418,350)

    All ratings
    Positive
    Neutral
    Negative
      • l***l (143)- Feedback left by buyer.
        Past 6 months
        Verified purchase
        Shipped quickly, packaged well and undamaged. Thank you!
      See all feedback