Kindle Price: | $29.99 |
Sold by: | Penguin Random House Publisher Services Price set by seller. |
Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Kindle Edition
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.
Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget.
You’ll learn:
- How to model security threats, using attacker profiles, assets, objectives, and countermeasures
- Electrical basics that will help you understand communication interfaces, signaling, and measurement
- How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips
- How to use timing and power analysis attacks to extract passwords and cryptographic keys
- Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization
Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
- ISBN-13978-1593278748
- PublisherNo Starch Press
- Publication dateDecember 21, 2021
- LanguageEnglish
- File size34204 KB
Kindle E-Readers
- Kindle Paperwhite
- Kindle Oasis (9th Generation)
- Kindle Oasis
- Kindle
- All New Kindle E-reader (11th Generation)
- Kindle Oasis (10th Generation)
- Kindle Voyage
- All New Kindle E-reader
- Kindle Paperwhite (10th Generation)
- Kindle Paperwhite (5th Generation)
- Kindle (10th Generation)
- Kindle Touch
- Kindle Paperwhite (11th Generation)
- Kindle Scribe (1st Generation)
- All new Kindle paperwhite
Fire Tablets
Customers who read this book also read
Editorial Reviews
Review
—Yifan Lu, Security Researcher
About the Author
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.
Product details
- ASIN : B077WZBFYL
- Publisher : No Starch Press (December 21, 2021)
- Publication date : December 21, 2021
- Language : English
- File size : 34204 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 489 pages
- Best Sellers Rank: #708,506 in Kindle Store (See Top 100 in Kindle Store)
- #35 in Embedded Computer Systems
- #63 in Manufacturing Engineering
- #221 in Network Security (Kindle Store)
- Customer Reviews:
About the authors
Jasper van Woudenberg has been involved in embedded device security on a broad range of topics: finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side-channel trace processing. Jasper is a father of two, husband of one, and CTO of Riscure North America. He lives in California, where he likes to bike mountains and board snow. The family cat tolerates him but is too cool for Twitter.
Colin O’Flynn runs NewAE Technology, Inc., a startup that designs tools and equipment to teach engineers about embedded security. He started the opensource ChipWhisperer project as part of his PhD research and was previously an assistant professor with Dalhousie University, where he taught embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United States on January 26, 2024Love it, send volume 2 plz
- Reviewed in the United States on March 16, 2023the recipient was happy with it
- Reviewed in the United States on January 20, 2022This book is very deep but introduces every as it goes.
Very interesting to read, and calls out the skill level and costs of approaches.
Even if you aren’t decapping ics it gives you insight
- Reviewed in the United States on August 12, 2022I just got this book and it seems like good content. Very low level if that's the kind of stuff you are into. I did have an issue with the book, and the publisher is very responsive.
- Reviewed in the United States on February 12, 2022Beautifully written; diverse array of topics
- Reviewed in the United States on May 12, 2022This book is scary. It is not just a guide on how to break into electronic products. It is good information for those who need to design products so that they have realistic expectations as to how and what can be done to attack their microcontroller or microprocessor based system. Don't read this book if you think you are better off not knowing. In reality, you should know. I highly recommend this book for cybersecurity personnel who need to extend their knowledge from the IT world into the embedded world. I also recommend it for anyone who designs products for sale using microcontrollers and microprocessors.
Top reviews from other countries
- Fábio SchornReviewed in Brazil on December 17, 2024
5.0 out of 5 stars Great book!
It is a book very interesting and really like the read of the chapters, and I really recommend this book.
-
Enrique A. Garcia JuarezReviewed in Mexico on December 30, 2023
5.0 out of 5 stars Una excelente fuente de información para aprender sobre ciberseguridad
Además trae muchas ligas y referencia a otros libros muy buenos tambien, definitivamente es la referencia perfecta para aprender ciberseguridad para sistemas embebidos.
- ValReviewed in Canada on August 4, 2022
4.0 out of 5 stars Very good book, but there is room for improvement
I really like this book. It's very informative and easy to follow.
I appreciate that the author provided some information about basic principles and terminology in the beginning of a book, but it wasn't entirely correct and could be improved.
The "Setting Up A Test Lab" part is very useful, even though there might be alternative opinions on what's needed to achieve a particular result.
There are quite a few eye-opening examples that show how easily some attack can be used to achieve a result that looked impossibly hard initially.
The book is definitely worth reading and re-reading, it's inspiring and eye-opening.
-
JavierReviewed in Spain on September 6, 2022
5.0 out of 5 stars Un libro must have si te apasiona el funcionamiento la electronica
No suelo hacer reseñas, pero este es un libro perfecto para aprender el funcionamiento del Hardware en dispositivos, tanto para principiantes con algo de conocimiento como para expertos y en mi opinión es un must have. Yo lo mantengo a mano para consultarlo de vez en cuando y siempre me ayuda en algo.
Los autores han hecho un gran trabajo con este libro y detallan perfectamente todos los conocimientos necesarios para poder entender cómo funciona un dispositivo y en muchas ocasiones poder hacer debuging o llegar extraer los datos.
Se explican todos los conocimientos necesarios y algunas de las cosas que destacaría del contenido este libro son:
- Bases del hardware
- Bases de la electrónica
- Explicación de múltiples herramientas y aparatos útiles
- Funcionamiento de los protocolos de comunicación
- Como funciona un chip y diferentes tipos
- Por dónde empezar a analizar una placa y cosas que buscar
- Ataques/Vulnerabilidades comunes y como hacerlos
- Múltiples tipos de inyección de fallos (útil para provocar que el chip haga cosas que no debería pero que quieres que haga)
- Análisis de señales y Análisis de energía avanzados (muy útil para predecir datos y claves criptográficas)
- Funcionamiento y aplicaciones de la criptografía
- Extracción de datos
- prevención de ataques
De las pocas cosas que no me han gustado de este libro es que, al estar impreso en blanco y negro, las imágenes son claramente visibles pero pierden su belleza, aun que entiendo que esto ayuda a mantener un precio accesible
En mi opinión es una muy buena compra, lo compré por alrededor de 35€ hace unos meses y lo complementé con otro muy buen libro “PoC || GTFO”. Eso sí, recomendaría tener unos conocimientos previos acerca de la electrónica, programación, matemática y claro está Ingles, si quieres entender el libro a su completo.
Javier
Reviewed in Spain on September 6, 2022
Los autores han hecho un gran trabajo con este libro y detallan perfectamente todos los conocimientos necesarios para poder entender cómo funciona un dispositivo y en muchas ocasiones poder hacer debuging o llegar extraer los datos.
Se explican todos los conocimientos necesarios y algunas de las cosas que destacaría del contenido este libro son:
- Bases del hardware
- Bases de la electrónica
- Explicación de múltiples herramientas y aparatos útiles
- Funcionamiento de los protocolos de comunicación
- Como funciona un chip y diferentes tipos
- Por dónde empezar a analizar una placa y cosas que buscar
- Ataques/Vulnerabilidades comunes y como hacerlos
- Múltiples tipos de inyección de fallos (útil para provocar que el chip haga cosas que no debería pero que quieres que haga)
- Análisis de señales y Análisis de energía avanzados (muy útil para predecir datos y claves criptográficas)
- Funcionamiento y aplicaciones de la criptografía
- Extracción de datos
- prevención de ataques
De las pocas cosas que no me han gustado de este libro es que, al estar impreso en blanco y negro, las imágenes son claramente visibles pero pierden su belleza, aun que entiendo que esto ayuda a mantener un precio accesible
En mi opinión es una muy buena compra, lo compré por alrededor de 35€ hace unos meses y lo complementé con otro muy buen libro “PoC || GTFO”. Eso sí, recomendaría tener unos conocimientos previos acerca de la electrónica, programación, matemática y claro está Ingles, si quieres entender el libro a su completo.
Images in this review - MihaReviewed in Germany on August 14, 2022
3.0 out of 5 stars Spoiled experience with bad pritout
it's such a pity that the print of the book is bad quality.
One cannot distinguish what's what in different figures.
Such a disappointment, it is crucial that all images are recognizable at least.