- Main
- Engineering - Computer Technology
- The Hardware Hacking Handbook: Breaking...
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
van Woudenberg, Jasper, O'Flynn, ColinQuanto ti piace questo libro?
Qual è la qualità del file?
Scarica il libro per la valutazione della qualità
Qual è la qualità dei file scaricati?
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power
Categorie:
Anno:
2021
Edizione:
1, converted
Casa editrice:
No Starch Press
Lingua:
english
Pagine:
512
ISBN 10:
1593278748
ISBN 13:
9781593278755
File:
PDF, 55.49 MB
I tuoi tag:
IPFS:
CID , CID Blake2b
english, 2021
Leggi Online
- Scaricare
- pdf 55.49 MB Current page
- Checking other formats...
- Convertire a
- Sbloccare file di conversione di dimensioni maggiori di 8 MB Premium
Il file verrà inviato al tuo indirizzo email. Ci vogliono fino a 1-5 minuti prima di riceverlo.
Entro 1-5 minuti il file verrà consegnato al tuo account Telegram.
Attenzione: assicurati di aver collegato il tuo account al bot Z-Library Telegram.
Entro 1-5 minuti il file verrà consegnato al tuo dispositivo Kindle.
Nota: devi verificare ogni libro che desideri inviare al tuo Kindle. Controlla la tua casella di posta per l'e-mail di verifica da Amazon Kindle Support.
La conversione in è in corso
La conversione in non è riuscita
Vantaggi dello status Premium
- Inviare a lettori di e-book
- Limite aumentato di download
- Converti i file
- Più risultati di ricerca
- Altri vantaggi