The Hardware Hacking Handbook: Breaking Embedded Security with Hardware AttacksNo Starch Press, 21.12.2021 - 512 Seiten The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand. |
Inhalt
Software Components | 4 |
Types of Attacks | 12 |
Assets and Security Objectives | 22 |
Disclosing Security Issues | 33 |
Interface with Electricity | 39 |
LowSpeed Serial Interfaces | 46 |
Parallel Interfaces | 59 |
Summary | 70 |
56 | 295 |
Sexy XORY Example | 299 |
An Advanced Encryption Standard Crash Course | 308 |
Summary | 322 |
Measurements on Real Devices | 331 |
59 | 333 |
Trace Set Analysis and Processing | 342 |
Summary | 358 |
Mapping the PCB | 102 |
36 | 108 |
39 | 114 |
4 | 119 |
41 | 124 |
Fault Injection Bull | 125 |
Fault Searching Methods | 131 |
Summary | 146 |
42 | 150 |
Voltage Fault Injection | 158 |
6 | 189 |
43 | 198 |
50 | 205 |
Differential Fault Analysis | 215 |
Summary | 222 |
53 | 241 |
8 | 245 |
9 | 265 |
Summary | 291 |
Obtaining and Building the Bootloader Code | 365 |
61 | 370 |
Recovering the IV | 374 |
Attacking the Signature | 380 |
Summary | 386 |
Power Analysis Attacks | 393 |
Countermeasures | 402 |
Industry Certifications | 420 |
50 to 500 | 426 |
71 | 434 |
The USB Armory Device | 444 |
300 to 8000 | 445 |
250 to 6000 | 451 |
25 to 10000 | 457 |
10 to 10000 | 463 |
471 | |
476 | |
Andere Ausgaben - Alle anzeigen
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Jasper van Woudenberg,Colin O'Flynn Eingeschränkte Leseprobe - 2021 |
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Jasper van Woudenberg,Colin O'Flynn Eingeschränkte Leseprobe - 2021 |
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Jasper van Woudenberg,Colin O'Flynn Keine Leseprobe verfügbar - 2021 |
Häufige Begriffe und Wortgruppen
algorithm Arduino block boot bootloader bytes capacitor capture Chapter chip ChipWhisperer ChipWhisperer-Nano circuit connected correlation countermeasures CPA attack crypto cryptographic debug decryption ECDSA embedded encryption entropy example fault injection firmware firmware image flash flash memory FPGA frequency function glitch Hamming weight header hypervisor implementation inject faults injector inout input interface JTAG key guess leakage Listing logic logic analyzer look loop means measure memory microcontroller MOSFET notebook OpenSSH operation oscilloscope output package parameters password perform power analysis power consumption power trace probe protocol pulse random require reset resistor reverse engineering S-box sample scope serial setup shows side-channel analysis side-channel attack signal signature simple solder specific switching target device tion tool Trezor trigger typically voltage waveform wires