Text
The hardware hacking handbook: breaking embedded security with hardware attacks
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.
Contents In Detail:
1. Dental Hygiene Introduction to Embedded Security
2. Reaching Out Touching Me Touching You Hardware Peripheral Interfaces
3. Casing the Joint Identifying Components and Gathering Information
4. Bull in a Porcelain Shop Introducing Fault Injection
5. Dont Lick the Probe How to Inject Faults
6. Bench Time Fault Injection Lab
7. X Marks the Spot Trezor One Wallet Memory Dump
8. Ive Got the Power Introduction to Power Analysis
9. Bench Time Simple Power Analysis
10. Splitting the Difference Differential Power Analysis
11. Gettin Nerdy with It Advanced Power Analysis
12. Bench Time Differential Power Analysis
13. No Kiddin RealLife Examples
14. Think of the Children Countermeasures Certifications and Goodbytes
Maxing Out Your Credit Card Setting Up a Test Lab
All Your Base Are Belong to Us Popular Pinouts
Index
No other version available