The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

Cover
No Starch Press, 21.12.2021 - 512 Seiten
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget.

You’ll learn:
  • How to model security threats, using attacker profiles, assets, objectives, and countermeasures
  • Electrical basics that will help you understand communication interfaces, signaling, and measurement
  • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips
  • How to use timing and power analysis attacks to extract passwords and cryptographic keys
  • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization

  • Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.
     

    Ausgewählte Seiten

    Inhalt

    Software Components
    4
    Types of Attacks
    12
    Assets and Security Objectives
    22
    Disclosing Security Issues
    33
    Interface with Electricity
    39
    LowSpeed Serial Interfaces
    46
    Parallel Interfaces
    59
    Summary
    70
    56
    295
    Sexy XORY Example
    299
    An Advanced Encryption Standard Crash Course
    308
    Summary
    322
    Measurements on Real Devices
    331
    59
    333
    Trace Set Analysis and Processing
    342
    Summary
    358

    Mapping the PCB
    102
    36
    108
    39
    114
    4
    119
    41
    124
    Fault Injection Bull
    125
    Fault Searching Methods
    131
    Summary
    146
    42
    150
    Voltage Fault Injection
    158
    6
    189
    43
    198
    50
    205
    Differential Fault Analysis
    215
    Summary
    222
    53
    241
    8
    245
    9
    265
    Summary
    291
    Obtaining and Building the Bootloader Code
    365
    61
    370
    Recovering the IV
    374
    Attacking the Signature
    380
    Summary
    386
    Power Analysis Attacks
    393
    Countermeasures
    402
    Industry Certifications
    420
    50 to 500
    426
    71
    434
    The USB Armory Device
    444
    300 to 8000
    445
    250 to 6000
    451
    25 to 10000
    457
    10 to 10000
    463
    Index
    471
    Patents
    476
    Urheberrecht

    Andere Ausgaben - Alle anzeigen

    Häufige Begriffe und Wortgruppen

    Autoren-Profil (2021)

    Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.

    Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.

    Bibliografische Informationen