CyberSecurity Summary

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks


Listen Later

The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded security, particularly the vulnerabilities in the hardware that can be exploited by attackers. It covers various hardware components and software running on them, along with how attackers can leverage these components to compromise the security of a system. The authors provide a framework for threat modeling, analyzing different attack types and countermeasures, and discussing techniques like fault injection, side-channel analysis, and power analysis. They demonstrate how these attacks can be used to break cryptographic algorithms and gain unauthorized access to sensitive data. The excerpt also includes practical advice on setting up a fault injection lab and performing basic side-channel attacks using real hardware.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Hardware-Hacking-Handbook-Breaking-Embedded/dp/1593278748?&linkCode=ll1&tag=cvthunderx-20&linkId=371d6a891e40168a30a8901d6d21414e&language=en_US&ref_=as_li_ss_tl

...more
View all episodesView all episodes
Download on the App Store

CyberSecurity SummaryBy CyberSecurity Summary