The Hardware Hacking Handbook Ebook Tooltip Ebooks kunnen worden gelezen op uw computer en op daarvoor geschikte e-readers. Breaking Embedded Security with Hardware Attacks
Afbeeldingen
Sla de afbeeldingen overArtikel vergelijken
- Engels
- E-book
- 9781593278755
- 21 december 2021
- Adobe ePub
Samenvatting
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.
Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget.
You’ll learn:
How to model security threats, using attacker profiles, assets, objectives, and countermeasures
Electrical basics that will help you understand communication interfaces, signaling, and measurement
How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips
How to use timing and power analysis attacks to extract passwords and cryptographic keys
Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization
Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
Productspecificaties
Inhoud
- Taal
- en
- Bindwijze
- E-book
- Oorspronkelijke releasedatum
- 21 december 2021
- Ebook Formaat
- Adobe ePub
- Illustraties
- Nee
Betrokkenen
- Hoofdauteur
- Jasper van Woudenberg
- Tweede Auteur
- Colin O'Flynn
- Hoofduitgeverij
- No Starch Press
Lees mogelijkheden
- Lees dit ebook op
- Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)
Overige kenmerken
- Studieboek
- Ja
EAN
- EAN
- 9781593278755
Je vindt dit artikel in
- Boek, ebook of luisterboek?
- Ebook
- Taal
- Engels
- Beschikbaarheid
- Leverbaar
- Studieboek of algemeen
- Algemene boeken
Kies gewenste uitvoering
Prijsinformatie en bestellen
De prijs van dit product is 25 euro en 99 cent.- E-book is direct beschikbaar na aankoop
- E-books lezen is voordelig
- Dag en nacht klantenservice
- Veilig betalen
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.