EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Sponsored

The Hardware Hacking Handbook - by Jasper Van Woudenberg & Colin O'Flynn (Paperback)

The Hardware Hacking Handbook - by  Jasper Van Woudenberg & Colin O'Flynn (Paperback) - 1 of 1
$43.99 sale price when purchased online
$49.99 list price
Target Online store #3991

About this item

Highlights

  • The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.
  • About the Author: Jasper van Woudenberg is the CTO of Riscure North America.
  • 512 Pages
  • Computers + Internet, Hardware

Description



About the Book



"A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"--



Book Synopsis



The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.

Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget.

You'll learn:

  • How to model security threats, using attacker profiles, assets, objectives, and countermeasures
  • Electrical basics that will help you understand communication interfaces, signaling, and measurement
  • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips
  • How to use timing and power analysis attacks to extract passwords and cryptographic keys
  • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization

  • Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand.



    Review Quotes




    "I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that's needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."
    --Yifan Lu, Security Researcher

    "One of the most complete introductions to hardware hacking I've seen . . . provide[s] you something you wouldn't learn elsewhere."
    --Arya Voronova, Hackaday



    About the Author



    Jasper van Woudenberg is the CTO of Riscure North America. He has been involved in embedded device security on a broad range of topics, including finding and helping fix bugs in code that runs on hundreds of millions of devices, using symbolic execution to extract keys from faulted cryptosystems, and using speech recognition algorithms for side channel trace processing. Jasper is a father of two and husband of one and lives in California, where he likes to bike mountains and board snow. He has a cat that tolerates him but is too cool for Twitter.

    Colin O'Flynn runs NewAE Technology Inc., a startup designing tools and equipment to teach engineers about embedded security. He started the open-source ChipWhisperer project as part of his PhD, and was previously an assistant professor with Dalhousie University teaching embedded systems and security. He lives in Halifax, Canada, and you can find his dogs featured in many of the products developed with NewAE.

    Dimensions (Overall): 9.2 Inches (H) x 7.0 Inches (W) x 1.2 Inches (D)
    Weight: 2.2 Pounds
    Suggested Age: 22 Years and Up
    Sub-Genre: Hardware
    Genre: Computers + Internet
    Number of Pages: 512
    Publisher: No Starch Press
    Theme: General
    Format: Paperback
    Author: Jasper Van Woudenberg & Colin O'Flynn
    Language: English
    Street Date: December 21, 2021
    TCIN: 1002647878
    UPC: 9781593278748
    Item Number (DPCI): 247-20-0824
    Origin: Made in the USA or Imported
    If the item details above aren’t accurate or complete, we want to know about it.

    Shipping details

    Estimated ship dimensions: 1.2 inches length x 7 inches width x 9.2 inches height
    Estimated ship weight: 2.2 pounds
    We regret that this item cannot be shipped to PO Boxes.
    This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

    Return details

    This item can be returned to any Target store or Target.com.
    This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
    See the return policy for complete information.

    Related Categories

    Get top deals, latest trends, and more.

    Privacy policy

    Footer

    About Us

    About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

    Help

    Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member Services

    Stores

    Find a StoreClinicPharmacyOpticalMore In-Store Services

    Services

    Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
    PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy