000 a
999 _c34050
_d34050
008 250610b xxu||||| |||| 00| 0 eng d
020 _a9781718503885
082 _a005.8
_bGOO
100 _aGoodspeed, Travis
245 _aMicrocontroller exploits
260 _bNo Starch Press,
_c2024.
_aSan Francisco :
300 _a435 p. ;
_bill., (b & w),
_c22 cm.
365 _b49.99
_c$
_d89.00
504 _aIncludes bibliographical references and index.
520 _aIn this advanced guide to hardware hacking, you’ll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it’s not a beginner’s first introduction. You’ll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You’ll see how the STM32F1’s exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you’ll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book, you’ll find an encyclopedic survey of vulnerabilities, indexed and cross-referenced for use in practicing hardware security.
650 _aSecurity Measures
650 _aElectronic Books
650 _aComputer Hacking
650 _aPenetration Testing
650 _aEmbedded Computer Systems
650 _aBootloader
650 _aFlash memory
942 _2ddc
_cBK