000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250610b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781718503885 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
GOO |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Goodspeed, Travis |
245 ## - TITLE STATEMENT |
Title |
Microcontroller exploits |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
No Starch Press, |
Date of publication, distribution, etc |
2024. |
Place of publication, distribution, etc |
San Francisco : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
435 p. ; |
Other physical details |
ill., (b & w), |
Dimensions |
22 cm. |
365 ## - TRADE PRICE |
Price amount |
49.99 |
Price type code |
$ |
Unit of pricing |
89.00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
In this advanced guide to hardware hacking, you’ll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it’s not a beginner’s first introduction. You’ll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You’ll see how the STM32F1’s exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you’ll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book, you’ll find an encyclopedic survey of vulnerabilities, indexed and cross-referenced for use in practicing hardware security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security Measures |
|
Topical term or geographic name as entry element |
Electronic Books |
|
Topical term or geographic name as entry element |
Computer Hacking |
|
Topical term or geographic name as entry element |
Penetration Testing |
|
Topical term or geographic name as entry element |
Embedded Computer Systems |
|
Topical term or geographic name as entry element |
Bootloader |
|
Topical term or geographic name as entry element |
Flash memory |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |