Microcontroller exploits (Record no. 34050)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250610b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781718503885
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number GOO
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Goodspeed, Travis
245 ## - TITLE STATEMENT
Title Microcontroller exploits
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc No Starch Press,
Date of publication, distribution, etc 2024.
Place of publication, distribution, etc San Francisco :
300 ## - PHYSICAL DESCRIPTION
Extent 435 p. ;
Other physical details ill., (b & w),
Dimensions 22 cm.
365 ## - TRADE PRICE
Price amount 49.99
Price type code $
Unit of pricing 89.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc In this advanced guide to hardware hacking, you’ll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it’s not a beginner’s first introduction. You’ll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You’ll see how the STM32F1’s exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you’ll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book, you’ll find an encyclopedic survey of vulnerabilities, indexed and cross-referenced for use in practicing hardware security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security Measures
Topical term or geographic name as entry element Electronic Books
Topical term or geographic name as entry element Computer Hacking
Topical term or geographic name as entry element Penetration Testing
Topical term or geographic name as entry element Embedded Computer Systems
Topical term or geographic name as entry element Bootloader
Topical term or geographic name as entry element Flash memory
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2025-05-26 KB 4449.11 005.8 GOO 035580 2025-06-10 Books

Powered by Koha