000 | a | ||
---|---|---|---|
999 |
_c34050 _d34050 |
||
008 | 250610b xxu||||| |||| 00| 0 eng d | ||
020 | _a9781718503885 | ||
082 |
_a005.8 _bGOO |
||
100 | _aGoodspeed, Travis | ||
245 | _aMicrocontroller exploits | ||
260 |
_bNo Starch Press, _c2024. _aSan Francisco : |
||
300 |
_a435 p. ; _bill., (b & w), _c22 cm. |
||
365 |
_b49.99 _c$ _d89.00 |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aIn this advanced guide to hardware hacking, you’ll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it’s not a beginner’s first introduction. You’ll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You’ll see how the STM32F1’s exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you’ll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book, you’ll find an encyclopedic survey of vulnerabilities, indexed and cross-referenced for use in practicing hardware security. | ||
650 | _aSecurity Measures | ||
650 | _aElectronic Books | ||
650 | _aComputer Hacking | ||
650 | _aPenetration Testing | ||
650 | _aEmbedded Computer Systems | ||
650 | _aBootloader | ||
650 | _aFlash memory | ||
942 |
_2ddc _cBK |