Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching.
Introduction
Chapter 1: Dental Hygiene: Introduction to Embedded
Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware
Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and
Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault
Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of
Trezor
Chapter 8: I’ve Got the Power: Introduction to Power
Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power
Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256
Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures,
Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test
Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Jasper van Woudenberg is the CTO of Riscure North America. He has
been involved in embedded device security on a broad range of
topics, including finding and helping fix bugs in code that runs on
hundreds of millions of devices, using symbolic execution to
extract keys from faulted cryptosystems, and using speech
recognition algorithms for side channel trace processing. Jasper is
a father of two and husband of one and lives in California, where
he likes to bike mountains and board snow. He has a cat that
tolerates him but is too cool for Twitter.
Colin O'Flynn runs NewAE Technology Inc., a startup designing tools
and equipment to teach engineers about embedded security. He
started the open-source ChipWhisperer project as part of his PhD,
and was previously an assistant professor with Dalhousie University
teaching embedded systems and security. He lives in Halifax,
Canada, and you can find his dogs featured in many of the products
developed with NewAE.
"I really wished such a book existed when I started with
researching hardware hacking a few years ago. It introduces all the
relevant background that’s needed for hardware hacking along with
references to further reading (the references are really nice to
have for more intermediate readers). It also provides many
practical examples that helps you see why the concepts are
important and how they are applied."
—Yifan Lu, Security Researcher
"One of the most complete introductions to hardware hacking I’ve
seen . . . provide[s] you something you wouldn't learn
elsewhere."
—Arya Voronova, Hackaday
Ask a Question About this Product More... |