Home > Computer & Internet > Computer hardware > Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
40%
Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

4       |  4 Reviews 
5
4
3
2
1

Available


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget.

You'll learn:

  • How to model security threats, using attacker profiles, assets, objectives, and countermeasures
  • Electrical basics that will help you understand communication interfaces, signaling, and measurement
  • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips
  • How to use timing and power analysis attacks to extract passwords and cryptographic keys
  • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization

  • Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand.
    About the Author: Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.

    Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.


    Best Sellers



    Product Details
    • ISBN-13: 9781593278748
    • Publisher: No Starch Press,US
    • Binding: Paperback
    • Language: English
    • Returnable: Y
    • Sub Title: Breaking Embedded Security with Hardware Attacks
    • Width: 178 mm
    • ISBN-10: 1593278748
    • Publisher Date: 21 May 2019
    • Height: 231 mm
    • No of Pages: 512
    • Spine Width: 28 mm
    • Weight: 942 gr


    Similar Products

    How would you rate your experience shopping for books on Bookswagon?

    Add Photo
    Add Photo

    Customer Reviews

    4       |  4 Reviews 
    out of (%) reviewers recommend this product
    Top Reviews
    Rating Snapshot
    Select a row below to filter reviews.
    5
    4
    3
    2
    1
    Average Customer Ratings
    4       |  4 Reviews 
    00 of 0 Reviews
    Sort by :
    Active Filters

    00 of 0 Reviews
    SEARCH RESULTS
    1–2 of 2 Reviews
      BoxerLover2 - 5 Days ago
      A Thrilling But Totally Believable Murder Mystery

      Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

      BoxerLover2 - 5 Days ago
      A Thrilling But Totally Believable Murder Mystery

      Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


    Sample text
    Photo of
      Media Viewer

      Sample text
      Reviews
      Reader Type:
      BoxerLover2
      00 of 0 review

      Your review was submitted!
      Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
      No Starch Press,US -
      Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
      Writing guidlines
      We want to publish your review, so please:
      • keep your review on the product. Review's that defame author's character will be rejected.
      • Keep your review focused on the product.
      • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
      • Refrain from mentioning competitors or the specific price you paid for the product.
      • Do not include any personally identifiable information, such as full names.

      Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

      Required fields are marked with *

      Review Title*
      Review
        Add Photo Add up to 6 photos
        Would you recommend this product to a friend?
        Tag this Book
        Read more
        Does your review contain spoilers?
        What type of reader best describes you?
        I agree to the terms & conditions
        You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

        CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

        These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


        By submitting any content to Bookswagon, you guarantee that:
        • You are the sole author and owner of the intellectual property rights in the content;
        • All "moral rights" that you may have in such content have been voluntarily waived by you;
        • All content that you post is accurate;
        • You are at least 13 years old;
        • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
        You further agree that you may not submit any content:
        • That is known by you to be false, inaccurate or misleading;
        • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
        • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
        • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
        • For which you were compensated or granted any consideration by any unapproved third party;
        • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
        • That contains any computer viruses, worms or other potentially damaging computer programs or files.
        You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


        For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


        All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

        Accept

        New Arrivals



        Inspired by your browsing history


        Your review has been submitted!

        You've already reviewed this product!