Buy Microcontroller Exploits Book by Travis Goodspeed
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer programming / software engineering > Microcontroller Exploits
Microcontroller Exploits

Microcontroller Exploits


     0     
5
4
3
2
1



International Edition


X
About the Book

Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities. Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities. In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction. You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book you'll find an encyclopedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security.

Table of Contents:
Introduction Chapter 1: Basics of Memory Extraction Chapter 2: STM32F217 DFU Exit Chapter 3: MD380 Null Pointer, DFU Chapter 4: LPC1343 Call Stack Chapter 5: Ledger Nano S, 0xF00DBABE Chapter 6: NipPEr Is a buTt liCkeR Chapter 7: RF 430 Backdoors Chapter 8: Basics of JTAG and ICSP Chapter 9: nRF51 Gadgets in ROM Chapter 10: STM32F0 SWD Word Leak Chapter 11: STM32F1 Interrupt Jigsaw Chapter 12: PIC18F452 ICSP and HID Chapter 13: Basics of Glitching Chapter 14: MC13224, the Simplest Fault Injection Chapter 15: LPC1114 Bootloader Glitch Chapter 16: nRF52 APPROTECT Glitch Chapter 17: STM32 FPB Glitch Chapter 18: Chip Decapsulation Chapter 19: PIC Ultraviolet Unlock Chapter 20: MSP430 Paparazzi Attack Chapter 21: CMOS VLSI Interlude Chapter 22: Mask ROM Photography Chapter 23: Game Boy Via ROM Chapter 24: Clipper Chip Diffusion ROM Chapter 25: Nintendo CIC and Clones Chapter A: More Bootloader Vulns Chapter B: More Debugger Attacks Chapter C: More Privilege Escalation Chapter D: More Invasive Attacks Chapter E: More Fault Injections Chapter F: More Test Modes Chapter G: More ROM Photography Chapter H: Unsorted Attacks Chapter I: Other Chips Thank you, kindly. Bibliography Index

About the Author :
Travis Goodspeed is an embedded systems reverse engineer from Tennessee, where he drives a Studebaker and collects memory extraction exploits for microcontrollers. His recent projects include a function recognizer for Thumb2 firmware, a fresh memory corruption exploit for a 90's smart card, and a CAD tool for extracting bits from mask ROM photographs.

Review :
"This is both a fascinating and profoundly disturbing book. On the fascinating side, it is a cornucopia of great information . . . On the disturbing side, all that great and profoundly useful information is now gathered in one place and presented by a master." —Richard Austin, IEEE-Cipher (Read More) "Understanding the pitfalls of microcontroller security is hard, because there are many exquisite and obscure bits of knowledge that must all work together. Before this book, there was only one effective way to learn: talk to a master practitioner like Travis. This book gives a broad and deep survey of the craft, but most importantly it gets the many critical bits in one place, under one cover. I am sure it will become a foundation of many career-changing classes. One day I hope to get good enough to teach one!" —Sergey Bratus, Distinguished Professor in Cyber Security, Technology, and Society, Dartmouth College  "We don't have many books focused on such a topic, but face security problems tied to hardware and specifically to microcontrollers every day. Travis's book is foundational to understanding the security problems and how the attackers are going to exploit them. This book is a must-read for every product security team involved in device security." — Alex Matrosov, CEO and Founder of Binarly "The book presents an inspiring and much-anticipated collection of microcontroller security vulnerabilities and exploits - presented by Travis himself. All the examples serve as an excellent reference of attack vectors that had often been excluded as being "out-of-scope" and "nobody would do that" until proven otherwise. This book is very hands-on and a great read for everyone interested in hardware security. I dearly hope that this book will also find its audience amongst chip vendors and especially their teams designing the next generation security architectures." —Dr. Johannes Obermaier, security engineer and researcher


Best Sellers


Product Details
  • ISBN-13: 9781718503885
  • Publisher: No Starch Press,US
  • Publisher Imprint: No Starch Press,US
  • Height: 220 mm
  • No of Pages: 408
  • Width: 160 mm
  • ISBN-10: 1718503881
  • Publisher Date: 10 Sep 2024
  • Binding: Hardback
  • Language: English
  • Returnable: Y


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Microcontroller Exploits
No Starch Press,US -
Microcontroller Exploits
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Microcontroller Exploits

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!