|Listed in category:
This listing was ended by the seller on Sun, 16 Jun at 8:16 AM because the item is no longer available.
Have one to sell?

Jasper van Woudenberg Colin O'Flynn The Hardware Hacking Handbook (Paperback)

Another great item from Rarewaves USA | Free delivery!
Condition:
New
More than 10 available / 1 sold
Price:
US $49.04
ApproximatelyEUR 45.67
Postage:
Free Economy Shipping. See detailsfor postage
Located in: 60502, United States
Delivery:
Estimated between Fri, 28 Jun and Wed, 10 Jul to 43230
Estimated delivery dates - opens in a new window or tab include seller's dispatch time, origin postcode, destination postcode and time of acceptance and will depend on delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return postage. See details- for more information about returns
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as a business seller
Seller assumes all responsibility for this listing.
eBay item number:296129696869
Last updated on 02 May, 2024 14:24:15 BSTView all revisionsView all revisions

Item specifics

Condition
New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
Book Title
The Hardware Hacking Handbook
Title
The Hardware Hacking Handbook
Subtitle
Breaking Embedded Security with Hardware Attacks
ISBN-10
1593278748
EAN
9781593278748
ISBN
9781593278748
Genre
Computing & Internet
Release Date
12/21/2021
Release Year
2021
Country/Region of Manufacture
US
Subject Area
Computers, Technology & Engineering
Publication Name
Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
Publisher
No Starch Press, Incorporated
Item Length
9.2 in
Subject
Security / General, Security / Networking, Electrical
Publication Year
2021
Type
Textbook
Format
Uk-Trade Paper
Language
English
Item Height
0.9 in
Author
Colin O'flynn, Jasper Van Woudenberg
Item Weight
34 Oz
Item Width
7.1 in
Number of Pages
512 Pages

About this product

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278748
ISBN-13
9781593278748
eBay Product ID (ePID)
243009939

Product Key Features

Number of Pages
512 Pages
Publication Name
Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
Language
English
Publication Year
2021
Subject
Security / General, Security / Networking, Electrical
Type
Textbook
Subject Area
Computers, Technology & Engineering
Author
Colin O'flynn, Jasper Van Woudenberg
Format
Uk-Trade Paper

Dimensions

Item Height
0.9 in
Item Weight
34 Oz
Item Length
9.2 in
Item Width
7.1 in

Additional Product Features

Intended Audience
Trade
LCCN
2021-027424
Reviews
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that's needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied." --Yifan Lu, Security Researcher
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
006.22
Table Of Content
Introduction Chapter 1: Dental Hygiene: Introduction to Embedded Security Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces Chapter 3: Casing the Joint: Identifying Components and Gathering Information Chapter 4: Bull in a China Shop: Introducing Fault Injection Chapter 5: Don't Lick the Probe: How to Inject Faults Chapter 6: Bench Time: Fault Injection Lab Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor Chapter 8: I've Got the Power: Introduction to Power Analysis Chapter 9: Bench Time: Simple Power Analysis Chapter 10: Splitting the Difference: Differential Power Analysis Chapter 11: Advanced Power Analysis Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader Chapter 13: No Kiddin': Real-Life Examples Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Synopsis
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching. The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn: - How to model security threats, using attacker profiles, assets, objectives, and countermeasures - Electrical basics that will help you understand communication interfaces, signaling, and measurement - How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips - How to use timing and power analysis attacks to extract passwords and cryptographic keys - Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere-in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn- How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
LC Classification Number
TK7870
ebay_catalog_id
4
Copyright Date
2018

Item description from the seller

Business seller information

Rarewaves-USA
Kathryn Searle
10100 W Sample Rd
Ste 101
33065 Coral Springs, FL
United States
Show contact information
:liamEmoc.asu-sevawerar@yabe
I certify that all my selling activities will comply with all EU laws and regulations.
rarewaves-usa

rarewaves-usa

97.2% positive Feedback
1.2M items sold

Detailed seller ratings

Average for the last 12 months

Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
4.9
Communication
4.8
Registered as a business seller

Seller Feedback (449,367)

s***s (1186)- Feedback left by buyer.
Past 6 months
Verified purchase
Great Price and Fast Shipping.
See all Feedback