Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt över 249 kr.
Beskrivning
The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.
Recensioner i media
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."—Yifan Lu, Security Researcher"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."—Arya Voronova, Hackaday
Innehållsförteckning
IntroductionChapter 1: Dental Hygiene: Introduction to Embedded SecurityChapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral InterfacesChapter 3: Casing the Joint: Identifying Components and Gathering InformationChapter 4: Bull in a China Shop: Introducing Fault InjectionChapter 5: Don’t Lick the Probe: How to Inject FaultsChapter 6: Bench Time: Fault Injection LabChapter 7: X Marks the Spot: EMFI Memory Dumping of TrezorChapter 8: I’ve Got the Power: Introduction to Power AnalysisChapter 9: Bench Time: Simple Power AnalysisChapter 10: Splitting the Difference: Differential Power AnalysisChapter 11: Advanced Power AnalysisChapter 12: A DPA/SCA Lab: Breaking an AES-256 BootloaderChapter 13: No Kiddin’: Real-Life ExamplesChapter 14: Think of the Children: Countermeasures, Certifications, and GoodbytesAppendix A: Maxing Out Your Credit Card: Setting Up a Test LabAppendix B: All Your Base Are Belong to Us: Popular Pinouts