The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
ISBN-10
1593278748
ISBN-13
9781593278748
Category
Computers
Pages
512
Language
English
Published
2021-12-21
Publisher
No Starch Press
Authors
Jasper van Woudenberg, Colin O'Flynn

Description

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: • How to model security threats, using attacker profiles, assets, objectives, and countermeasures • Electrical basics that will help you understand communication interfaces, signaling, and measurement • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips • How to use timing and power analysis attacks to extract passwords and cryptographic keys • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.

Other editions

Similar books

  • The Hardware Hacker: Adventures in Making and Breaking Hardware
    By Andrew Bunnie Huang

    Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and ...

  • Hardware Hacking: Have Fun while Voiding your Warranty
    By Kevin D. Mitnick, Joe Grand, Ryan Russell

    "If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek.

  • The Car Hacker's Handbook: A Guide for the Penetration Tester
    By Craig Smith

    The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles.

  • Android Hacker's Handbook
    By Joshua J. Drake, Zach Lanier, Collin Mulliner

    This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system.

  • Hardware Hacking Projects for Geeks
    By Scott Fullam

    A collection of unusual projects for computer hardware geeks of all ages explains how to create such projects as a personal Lojack system, Web-enabled coffee machine, cubicle intrusion detection systems, and a laptop battery extender.

  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
    By Aditya Gupta

    What You’ll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in ...

  • The Hardware Hacking Handbook
    By Colin O'Flynn

    The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

  • The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
    By Dave Aitel, Susan Young

    Black Hat Hacker In contrast to a White Hat hacker, a Black Hat is in general put into the “bad guy” corner. But Black Hats would prefer to define themselves as “not White Hat” and never as “bad guys,” because from their point of view, ...

  • Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
    By Fotios Chantzis, Ioannis Stais, Paulino Calderon

    The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.

  • Handmade Electronic Music: The Art of Hardware Hacking
    By Nicolas Collins

    Handmade Electronic Music: The Art of Hardware Hacking provides a long-needed, practical, and engaging introduction for students of electronic music, installation and sound-art to the craft of making--as well as creatively cannibalizing- ...