did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781593278748

The Hardware Hacking Handbook Breaking Embedded Security with Hardware Attacks

by ;
  • ISBN13:

    9781593278748

  • ISBN10:

    1593278748

  • Format: Paperback
  • Copyright: 2021-12-21
  • Publisher: No Starch Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $1.50
  • Buy New
    $48.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 3-5 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget.
 
You’ll learn:
  • How to model security threats, using attacker profiles, assets, objectives, and countermeasures
  • Electrical basics that will help you understand communication interfaces, signaling, and measurement 
  • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips 
  • How to use timing and power analysis attacks to extract passwords and cryptographic keys
  • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization

  • Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.

    Author Biography

    Jasper van Woudenberg is CTO North America of Riscure, a global security test lab and tools leader for embedded and connected devices. Jasper taught himself software reverse engineering in his teens, and at Riscure has co-authored various academic publications on side channel and fault attacks. Jasper teaches courses at conferences such a Black Hat, trains Riscure colleagues, and is a regular conference speaker. He lives in San Francisco, USA, and likes to spend his time with his family or on a mountain bike.

    Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, which is now supported by NewAE Technology Inc. He lives in Halifax, Canada.

    Table of Contents

    Introduction
    Chapter 1: Dental Hygiene: Introduction to Embedded Security
    Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
    Chapter 3: Casing the Joint: Identifying Components and Gathering Information
    Chapter 4: Bull in a China Shop: Introducing Fault Injection
    Chapter 5: Don’t Lick the Probe: How to Inject Faults
    Chapter 6: Bench Time: Fault Injection Lab
    Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
    Chapter 8: I’ve Got the Power: Introduction to Power Analysis
    Chapter 9: Bench Time: Simple Power Analysis
    Chapter 10: Splitting the Difference: Differential Power Analysis
    Chapter 11: Advanced Power Analysis
    Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
    Chapter 13: No Kiddin’: Real-Life Examples
    Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
    Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
    Appendix B: All Your Base Are Belong to Us: Popular Pinouts

    Supplemental Materials

    What is included with this book?

    The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

    The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

    Rewards Program