Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
39,95 €*
Versandkostenfrei per Post / DHL
auf Lager, Lieferzeit 4-7 Werktage
Kategorien:
Beschreibung
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis.
Über den Autor
Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.
Inhaltsverzeichnis
Introduction
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Hardware |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9781593278748 |
ISBN-10: | 1593278748 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Woudenberg, Jasper van
O'Flynn, Colin |
Hersteller: |
Random House LLC US
No Starch Press |
Verantwortliche Person für die EU: | Springer Fachmedien Wiesbaden GmbH, Postfach:15 46, D-65189 Wiesbaden, info@bod.de |
Maße: | 178 x 232 x 30 mm |
Von/Mit: | Jasper van Woudenberg (u. a.) |
Erscheinungsdatum: | 21.12.2021 |
Gewicht: | 0,946 kg |
Über den Autor
Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.
Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.
Inhaltsverzeichnis
Introduction
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Hardware |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9781593278748 |
ISBN-10: | 1593278748 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Woudenberg, Jasper van
O'Flynn, Colin |
Hersteller: |
Random House LLC US
No Starch Press |
Verantwortliche Person für die EU: | Springer Fachmedien Wiesbaden GmbH, Postfach:15 46, D-65189 Wiesbaden, info@bod.de |
Maße: | 178 x 232 x 30 mm |
Von/Mit: | Jasper van Woudenberg (u. a.) |
Erscheinungsdatum: | 21.12.2021 |
Gewicht: | 0,946 kg |
Sicherheitshinweis