Nicht aus der Schweiz? Besuchen Sie lehmanns.de
The Hardware Hacking Handbook - Jasper van Woudenberg, Colin O'Flynn

The Hardware Hacking Handbook

Breaking Embedded Security with Hardware Attacks
Buch | Softcover
512 Seiten
2021
No Starch Press,US (Verlag)
978-1-59327-874-8 (ISBN)
CHF 83,75 inkl. MwSt
  • Versand in 2-3 Tagen 
    (Artikel im Versandlager)
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.   Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.

Introduction
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts

Erscheinungsdatum
Verlagsort San Francisco
Sprache englisch
Maße 179 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Hardware
Technik
ISBN-10 1-59327-874-8 / 1593278748
ISBN-13 978-1-59327-874-8 / 9781593278748
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich