Microcontroller Exploits (Hardcover)
Goodspeed, Travis
- 出版商: No Starch Press
- 出版日期: 2024-09-10
- 售價: $1,840
- 貴賓價: 9.5 折 $1,748
- 語言: 英文
- 頁數: 408
- 裝訂: Hardcover - also called cloth, retail trade, or trade
- ISBN: 1718503881
- ISBN-13: 9781718503885
立即出貨
買這商品的人也買了...
-
$280$238 -
$648$616 -
$505網絡攻防實戰研究:MySQL數據庫安全
-
$2,200$2,090 -
$505區塊鏈應用開發指南 : 業務場景剖析與實戰
-
$1,194$1,134 -
$890$703 -
$594$564 -
$704嵌入式實時操作系統 — 基於 ARM Mbed OS 的應用實踐
-
$534$507 -
$528$502 -
$505從零學習PLC編程與接線
-
$594$564 -
$2,527CCNP and CCIE Security Core Scor 350-701 Official Cert Guide, 2/e (Paperback)
-
$954$906 -
$880$695 -
$474$450 -
$654$621 -
$594$564 -
$648$616 -
$894$849 -
$1,074$1,020 -
$800$632 -
$828$787 -
$1,242數據有道(數據分析+圖論與網絡+微課+Python編程)
相關主題
商品描述
Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.
In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted.
This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction.
You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash.
For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab.
In the second half of the book you'll find an encyclopedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security.
作者簡介
Travis Goodspeed is an embedded systems reverse engineer from Tennessee, where he drives a Studebaker and collects memory extraction exploits for microcontrollers. His recent projects include a function recognizer for Thumb2 firmware, a fresh memory corruption exploit for a 90's smart card, and a CAD tool for extracting bits from mask ROM photographs.