Microcontroller Exploits (Hardcover)
暫譯: 微控制器漏洞剖析 (精裝版)

Goodspeed, Travis

  • 出版商: No Starch Press
  • 出版日期: 2024-09-10
  • 售價: $1,840
  • 貴賓價: 9.5$1,748
  • 語言: 英文
  • 頁數: 408
  • 裝訂: Hardcover - also called cloth, retail trade, or trade
  • ISBN: 1718503881
  • ISBN-13: 9781718503885
  • 立即出貨

買這商品的人也買了...

商品描述

Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.

In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted.

This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction.

You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash.

For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab.

In the second half of the book you'll find an encyclopedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security.

商品描述(中文翻譯)

《微控制器攻擊》深入探討了進階硬體駭客技術,提供了真實世界技術的詳細範例以及全面的漏洞調查。

在這本進階的硬體駭客指南中,您將學習如何從單晶片電腦中讀取軟體,特別是在這些電腦被配置為不允許提取韌體的情況下。

本書記錄了各種各樣的微晶片駭客技術;這並不是初學者的入門書籍。

您將開始探索駭客攻擊真實世界晶片的詳細技術,例如 STM32F0 如何在每次重置後允許轉儲一個字。您將看到 STM32F1 的例外處理如何在一小時內慢慢洩漏韌體,以及德州儀器的 MSP430 韌體如何通過相機閃光燈被提取。

對於每個攻擊,您將學習如何在自己的實驗室中重現結果,轉儲晶片。

在本書的後半部分,您將找到一個百科全書式的漏洞調查,並進行索引和交叉參考,以便用於實踐硬體安全。

作者簡介

Travis Goodspeed is an embedded systems reverse engineer from Tennessee, where he drives a Studebaker and collects memory extraction exploits for microcontrollers. His recent projects include a function recognizer for Thumb2 firmware, a fresh memory corruption exploit for a 90's smart card, and a CAD tool for extracting bits from mask ROM photographs.

作者簡介(中文翻譯)

Travis Goodspeed 是來自田納西州的嵌入式系統逆向工程師,他駕駛著一輛Studebaker,並收集微控制器的記憶體提取漏洞。他最近的專案包括一個用於Thumb2韌體的函數識別器、一個針對90年代智慧卡的新記憶體損壞漏洞,以及一個用於從掩模ROM照片中提取位元的CAD工具。