第 1/1 張圖片
![Jasper van Woudenberg Colin O'Flynn The Hardware Hacking Handbook (Paperback) - 第 1/1 張圖片](https://i.ebayimg.com/images/g/MNYAAOSwYA9mKocN/s-l500.jpg)
已結束
Jasper van Woudenberg Colin O'Flynn The Hardware Hacking Handbook (Paperback)
Another great item from Rarewaves USA | Free delivery!
狀況:
至少還有 10 件 / 賣出 1 件
價格:
US $49.04
大約HK$ 382.91
運費:
所在地:60502, 美國
送達日期:
估計於 6月28日, 五至 7月10日, 三之間送達 運送地點 43230
退貨:
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
安心購物
物品細節
- 物品狀況
- 全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
- Book Title
- The Hardware Hacking Handbook
- Title
- The Hardware Hacking Handbook
- Subtitle
- Breaking Embedded Security with Hardware Attacks
- ISBN-10
- 1593278748
- EAN
- 9781593278748
- ISBN
- 9781593278748
- Genre
- Computing & Internet
- Release Date
- 12/21/2021
- Release Year
- 2021
- Country/Region of Manufacture
- US
- Subject Area
- Computers, Technology & Engineering
- Publication Name
- Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
- Publisher
- No Starch Press, Incorporated
- Item Length
- 9.2 in
- Subject
- Security / General, Security / Networking, Electrical
- Publication Year
- 2021
- Type
- Textbook
- Format
- Uk-Trade Paper
- Language
- English
- Item Height
- 0.9 in
- Item Weight
- 34 Oz
- Item Width
- 7.1 in
- Number of Pages
- 512 Pages
關於產品
Product Identifiers
Publisher
No Starch Press, Incorporated
ISBN-10
1593278748
ISBN-13
9781593278748
eBay Product ID (ePID)
243009939
Product Key Features
Number of Pages
512 Pages
Publication Name
Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
Language
English
Publication Year
2021
Subject
Security / General, Security / Networking, Electrical
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Uk-Trade Paper
Dimensions
Item Height
0.9 in
Item Weight
34 Oz
Item Length
9.2 in
Item Width
7.1 in
Additional Product Features
Intended Audience
Trade
LCCN
2021-027424
Reviews
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that's needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied." --Yifan Lu, Security Researcher
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
006.22
Table Of Content
Introduction Chapter 1: Dental Hygiene: Introduction to Embedded Security Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces Chapter 3: Casing the Joint: Identifying Components and Gathering Information Chapter 4: Bull in a China Shop: Introducing Fault Injection Chapter 5: Don't Lick the Probe: How to Inject Faults Chapter 6: Bench Time: Fault Injection Lab Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor Chapter 8: I've Got the Power: Introduction to Power Analysis Chapter 9: Bench Time: Simple Power Analysis Chapter 10: Splitting the Difference: Differential Power Analysis Chapter 11: Advanced Power Analysis Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader Chapter 13: No Kiddin': Real-Life Examples Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Synopsis
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching. The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn: - How to model security threats, using attacker profiles, assets, objectives, and countermeasures - Electrical basics that will help you understand communication interfaces, signaling, and measurement - How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips - How to use timing and power analysis attacks to extract passwords and cryptographic keys - Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere-in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn- How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
LC Classification Number
TK7870
ebay_catalog_id
4
Copyright Date
2018
賣家提供的物品說明
運費與處理費
物品所在地:
60502, 美國
運送地點
全球
排除:
不丹, 也門, 以色列, 俄羅斯聯邦, 利比亞, 加拿大, 南非, 墨西哥, 奧地利, 委內瑞拉, 寮國, 巴西, 巴貝多, 德國, 意大利, 新喀里多尼亞, 汶萊, 法國, 法屬圭亞那, 法屬玻里尼西亞, 澳洲, 烏克蘭, 瑞士, 瓜德羅普島, 留尼汪島, 白俄羅斯, 英國, 西班牙, 阿富汗, 馬提尼克島
運費與處理費 | 每加一件物品 | 運送地點 | 運送方式 | 運送*查看送達備註 |
---|---|---|---|---|
免運費 | 免費 | 美國 | Economy Shipping | 估計於 6月28日, 五至 7月10日, 三之間送達 運送地點 43230 |
處理時間 |
---|
通常會在收到所有款項後的 6 個工作日內發貨。 |
稅項 |
---|
賣家將對以下州別的買家收取銷售稅: |
物品編號 296129696869 的銷售稅
物品編號 296129696869 的銷售稅
賣家會對寄往以下各州的物品收取銷售稅:
州/省 | 銷售稅稅率 |
---|
退貨政策
收到物品後聯絡賣家的期限: | 退款方式 |
---|---|
30 日 | 退款, 替換物品 |
買家負責支付退貨運費。
賣家信用評價 (449,433)
這件物品(1)
所有物品(449,433)
s***s (1186)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Great Price and Fast Shipping.
o***o (204)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
The movie arrived quickly and in safe packaging! Great seller! A+++
m***e (448)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Thanks i recived it in good condition
i***r (1301)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Fast shipping and well packaged!