Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks by Colin O'Flynn and Jasper van Woudenberg (2021, Uk-Trade Paper)

Callielovescats (335)
100% positive feedback
Price:
US $39.24
(inclusive of GST)
ApproximatelyS$ 50.00
+ $37.30 shipping
Estimated delivery Wed, 23 Jul - Fri, 1 Aug
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Very Good

About this product

Product Identifiers

PublisherNo Starch Press, Incorporated
ISBN-101593278748
ISBN-139781593278748
eBay Product ID (ePID)243009939

Product Key Features

Number of Pages512 Pages
LanguageEnglish
Publication NameHardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
SubjectSecurity / General, Security / Networking, Electrical
Publication Year2021
TypeTextbook
AuthorColin O'flynn, Jasper Van Woudenberg
Subject AreaComputers, Technology & Engineering
FormatUk-Trade Paper

Dimensions

Item Height0.9 in
Item Weight34 Oz
Item Length9.2 in
Item Width7.1 in

Additional Product Features

Intended AudienceTrade
LCCN2021-027424
TitleLeadingThe
Dewey Edition23
Reviews"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that's needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied." --Yifan Lu, Security Researcher
IllustratedYes
Dewey Decimal006.22
Table Of ContentIntroduction Chapter 1: Dental Hygiene: Introduction to Embedded Security Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces Chapter 3: Casing the Joint: Identifying Components and Gathering Information Chapter 4: Bull in a China Shop: Introducing Fault Injection Chapter 5: Don't Lick the Probe: How to Inject Faults Chapter 6: Bench Time: Fault Injection Lab Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor Chapter 8: I've Got the Power: Introduction to Power Analysis Chapter 9: Bench Time: Simple Power Analysis Chapter 10: Splitting the Difference: Differential Power Analysis Chapter 11: Advanced Power Analysis Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader Chapter 13: No Kiddin': Real-Life Examples Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab Appendix B: All Your Base Are Belong to Us: Popular Pinouts
SynopsisHardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching. The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn: - How to model security threats, using attacker profiles, assets, objectives, and countermeasures - Electrical basics that will help you understand communication interfaces, signaling, and measurement - How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips - How to use timing and power analysis attacks to extract passwords and cryptographic keys - Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems., The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.
LC Classification NumberTK7870

All listings for this product

Buy It Now
Any Condition
New
Pre-owned
No ratings or reviews yet
Be the first to write a review