Outerwear Edit from Shopbop
To share your reaction on this item, open the Amazon app from the App Store or Google Play on your phone.

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

eBook features:
  • Highlight, take notes, and search in the book
  • In this edition, page numbers are just like the physical edition
You've subscribed to ! We will preorder your items within 24 hours of when they become available. When new books are released, we'll charge your default payment method for the lowest price available during the pre-order period.
Update your device or payment method, cancel individual pre-orders or your subscription at
Your Memberships & Subscriptions
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Kindle Edition

4.8 4.8 out of 5 stars 178 ratings

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget.
 
You’ll learn:
  • How to model security threats, using attacker profiles, assets, objectives, and countermeasures
  • Electrical basics that will help you understand communication interfaces, signaling, and measurement 
  • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips 
  • How to use timing and power analysis attacks to extract passwords and cryptographic keys
  • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization

Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
Due to its large file size, this book may take longer to download

Editorial Reviews

Review

"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."
—Yifan Lu, Security Researcher

About the Author

Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.

Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.

Product details

  • ASIN ‏ : ‎ B077WZBFYL
  • Publisher ‏ : ‎ No Starch Press (December 21, 2021)
  • Publication date ‏ : ‎ December 21, 2021
  • Language ‏ : ‎ English
  • File size ‏ : ‎ 34204 KB
  • Text-to-Speech ‏ : ‎ Enabled
  • Screen Reader ‏ : ‎ Supported
  • Enhanced typesetting ‏ : ‎ Enabled
  • X-Ray ‏ : ‎ Not Enabled
  • Word Wise ‏ : ‎ Not Enabled
  • Print length ‏ : ‎ 489 pages
  • Customer Reviews:
    4.8 4.8 out of 5 stars 178 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.8 out of 5 stars
178 global ratings

Review this product

Share your thoughts with other customers

Top reviews from the United States

  • Reviewed in the United States on January 26, 2024
    Love it, send volume 2 plz
  • Reviewed in the United States on March 16, 2023
    the recipient was happy with it
  • Reviewed in the United States on January 20, 2022
    This book is very deep but introduces every as it goes.
    Very interesting to read, and calls out the skill level and costs of approaches.
    Even if you aren’t decapping ics it gives you insight
    5 people found this helpful
    Report
  • Reviewed in the United States on August 12, 2022
    I just got this book and it seems like good content. Very low level if that's the kind of stuff you are into. I did have an issue with the book, and the publisher is very responsive.
    2 people found this helpful
    Report
  • Reviewed in the United States on February 12, 2022
    Beautifully written; diverse array of topics
    One person found this helpful
    Report
  • Reviewed in the United States on May 12, 2022
    This book is scary. It is not just a guide on how to break into electronic products. It is good information for those who need to design products so that they have realistic expectations as to how and what can be done to attack their microcontroller or microprocessor based system. Don't read this book if you think you are better off not knowing. In reality, you should know. I highly recommend this book for cybersecurity personnel who need to extend their knowledge from the IT world into the embedded world. I also recommend it for anyone who designs products for sale using microcontrollers and microprocessors.
    12 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Fábio Schorn
    5.0 out of 5 stars Great book!
    Reviewed in Brazil on December 17, 2024
    It is a book very interesting and really like the read of the chapters, and I really recommend this book.
  • Enrique A. Garcia Juarez
    5.0 out of 5 stars Una excelente fuente de información para aprender sobre ciberseguridad
    Reviewed in Mexico on December 30, 2023
    Además trae muchas ligas y referencia a otros libros muy buenos tambien, definitivamente es la referencia perfecta para aprender ciberseguridad para sistemas embebidos.
  • Val
    4.0 out of 5 stars Very good book, but there is room for improvement
    Reviewed in Canada on August 4, 2022
    I really like this book. It's very informative and easy to follow.
    I appreciate that the author provided some information about basic principles and terminology in the beginning of a book, but it wasn't entirely correct and could be improved.
    The "Setting Up A Test Lab" part is very useful, even though there might be alternative opinions on what's needed to achieve a particular result.
    There are quite a few eye-opening examples that show how easily some attack can be used to achieve a result that looked impossibly hard initially.
    The book is definitely worth reading and re-reading, it's inspiring and eye-opening.
  • Javier
    5.0 out of 5 stars Un libro must have si te apasiona el funcionamiento la electronica
    Reviewed in Spain on September 6, 2022
    No suelo hacer reseñas, pero este es un libro perfecto para aprender el funcionamiento del Hardware en dispositivos, tanto para principiantes con algo de conocimiento como para expertos y en mi opinión es un must have. Yo lo mantengo a mano para consultarlo de vez en cuando y siempre me ayuda en algo.

    Los autores han hecho un gran trabajo con este libro y detallan perfectamente todos los conocimientos necesarios para poder entender cómo funciona un dispositivo y en muchas ocasiones poder hacer debuging o llegar extraer los datos.

    Se explican todos los conocimientos necesarios y algunas de las cosas que destacaría del contenido este libro son:

    - Bases del hardware
    - Bases de la electrónica
    - Explicación de múltiples herramientas y aparatos útiles
    - Funcionamiento de los protocolos de comunicación
    - Como funciona un chip y diferentes tipos
    - Por dónde empezar a analizar una placa y cosas que buscar
    - Ataques/Vulnerabilidades comunes y como hacerlos
    - Múltiples tipos de inyección de fallos (útil para provocar que el chip haga cosas que no debería pero que quieres que haga)
    - Análisis de señales y Análisis de energía avanzados (muy útil para predecir datos y claves criptográficas)
    - Funcionamiento y aplicaciones de la criptografía
    - Extracción de datos
    - prevención de ataques

    De las pocas cosas que no me han gustado de este libro es que, al estar impreso en blanco y negro, las imágenes son claramente visibles pero pierden su belleza, aun que entiendo que esto ayuda a mantener un precio accesible

    En mi opinión es una muy buena compra, lo compré por alrededor de 35€ hace unos meses y lo complementé con otro muy buen libro “PoC || GTFO”. Eso sí, recomendaría tener unos conocimientos previos acerca de la electrónica, programación, matemática y claro está Ingles, si quieres entender el libro a su completo.
    Customer image
    Javier
    5.0 out of 5 stars Un libro must have si te apasiona el funcionamiento la electronica
    Reviewed in Spain on September 6, 2022
    No suelo hacer reseñas, pero este es un libro perfecto para aprender el funcionamiento del Hardware en dispositivos, tanto para principiantes con algo de conocimiento como para expertos y en mi opinión es un must have. Yo lo mantengo a mano para consultarlo de vez en cuando y siempre me ayuda en algo.

    Los autores han hecho un gran trabajo con este libro y detallan perfectamente todos los conocimientos necesarios para poder entender cómo funciona un dispositivo y en muchas ocasiones poder hacer debuging o llegar extraer los datos.

    Se explican todos los conocimientos necesarios y algunas de las cosas que destacaría del contenido este libro son:

    - Bases del hardware
    - Bases de la electrónica
    - Explicación de múltiples herramientas y aparatos útiles
    - Funcionamiento de los protocolos de comunicación
    - Como funciona un chip y diferentes tipos
    - Por dónde empezar a analizar una placa y cosas que buscar
    - Ataques/Vulnerabilidades comunes y como hacerlos
    - Múltiples tipos de inyección de fallos (útil para provocar que el chip haga cosas que no debería pero que quieres que haga)
    - Análisis de señales y Análisis de energía avanzados (muy útil para predecir datos y claves criptográficas)
    - Funcionamiento y aplicaciones de la criptografía
    - Extracción de datos
    - prevención de ataques

    De las pocas cosas que no me han gustado de este libro es que, al estar impreso en blanco y negro, las imágenes son claramente visibles pero pierden su belleza, aun que entiendo que esto ayuda a mantener un precio accesible

    En mi opinión es una muy buena compra, lo compré por alrededor de 35€ hace unos meses y lo complementé con otro muy buen libro “PoC || GTFO”. Eso sí, recomendaría tener unos conocimientos previos acerca de la electrónica, programación, matemática y claro está Ingles, si quieres entender el libro a su completo.
    Images in this review
    Customer image
    Customer image
  • Miha
    3.0 out of 5 stars Spoiled experience with bad pritout
    Reviewed in Germany on August 14, 2022
    it's such a pity that the print of the book is bad quality.
    One cannot distinguish what's what in different figures.

    Such a disappointment, it is crucial that all images are recognizable at least.

Report an issue


Does this item contain inappropriate content?
Do you believe that this item violates a copyright?
Does this item contain quality or formatting issues?