The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.

The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.

1127951979
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.

The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.

39.99 Out Of Stock
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

by M.A.S.U, C.M.R.
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

by M.A.S.U, C.M.R.

Paperback

$39.99 
  • SHIP THIS ITEM
    Out of Stock Online.

Related collections and offers


Overview

Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.

The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.


Product Details

ISBN-13: 9781593278748
Publisher: No Starch Press
Publication date: 01/02/2079
Pages: 300
Product dimensions: 7.00(w) x 9.10(h) x 1.10(d)

About the Author

Jasper van Woudenberg is CTO North America of Riscure, a global security test lab and tools leader for embedded and connected devices. Jasper taught himself software reverse engineering in his teens, and at Riscure has co-authored various academic publications on side channel and fault attacks. Jasper teaches courses at conferences such a Black Hat, trains Riscure colleagues, and is a regular conference speaker. He lives in San Francisco, USA, and likes to spend his time with his family or on a mountain bike.

Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, which is now supported by NewAE Technology Inc. He lives in Halifax, Canada.

From the B&N Reads Blog

Customer Reviews

Explore More Items