Microcontroller Exploits
Goodspeed, Travis
- 出版商: No Starch Press
- 出版日期: 2024-09-10
- 售價: $1,840
- 貴賓價: 9.5 折 $1,748
- 語言: 英文
- 頁數: 408
- 裝訂: Hardcover - also called cloth, retail trade, or trade
- ISBN: 1718503881
- ISBN-13: 9781718503885
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$505網絡攻防實戰研究:MySQL數據庫安全
-
$540$513 -
$880$748 -
$250網絡輿論引導能力研究
-
$2,150$2,043 -
$505區塊鏈應用開發指南 : 業務場景剖析與實戰
-
$1,000$850 -
$296金融信息安全導論
-
$594$564 -
$880$748 -
$319網絡測試和故障診斷(第2版)
-
$454Java 網絡編程實戰
-
$620$490 -
$720$612 -
$352面向社會計算的手機用戶行為大數據研究
-
$502PLC 編程與伺服控制從入門到工程實戰
-
$505從零學習PLC編程與接線
-
$594$564 -
$648$616 -
$602數據通信網絡實踐:基礎知識與交換機技術
-
$980$686 -
$2,527CCNP and CCIE Security Core Scor 350-701 Official Cert Guide 2nd Edition
-
$594$564 -
$474$450 -
$594$564
相關主題
商品描述
Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.
In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted.
This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction.
You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash.
For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab.
In the second half of the book you'll find an encyclopedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security.
商品描述(中文翻譯)
《Microcontroller Exploits》是一本深入探討進階硬體駭客技術的書籍,提供了真實世界技術的詳細範例以及全面的漏洞調查。
在這本進階的硬體駭客指南中,您將學習如何從單晶片電腦中讀取軟體,特別是在這些電腦被配置為不允許提取韌體的情況下。
本書記錄了各種各樣的微晶片駭客技術;這並不是初學者的入門書籍。
您將開始探索駭客攻擊真實世界晶片的詳細技術,例如如何在每次重置後從STM32F0中轉儲一個字。您將看到STM32F1的例外處理如何在一小時內慢慢洩漏韌體,以及如何通過相機閃光燈提取德州儀器的MSP430韌體。
對於每個攻擊,您將學習如何在自己的實驗室中重現結果,轉儲晶片。
在本書的後半部分,您將找到一個百科全書式的漏洞調查,並進行索引和交叉參考,以便用於實踐硬體安全。
作者簡介
Travis Goodspeed is an embedded systems reverse engineer from Tennessee, where he drives a Studebaker and collects memory extraction exploits for microcontrollers. His recent projects include a function recognizer for Thumb2 firmware, a fresh memory corruption exploit for a 90's smart card, and a CAD tool for extracting bits from mask ROM photographs.
作者簡介(中文翻譯)
Travis Goodspeed 是來自田納西州的嵌入式系統逆向工程師,他駕駛著一輛 Studebaker,並收集微控制器的記憶體提取漏洞。他最近的專案包括一個用於 Thumb2 韌體的函數識別器、一個針對 90 年代智慧卡的新記憶體損壞漏洞,以及一個用於從掩模 ROM 照片中提取位元的 CAD 工具。