Microcontroller Exploits | Agenda Bookshop Skip to content
Selected Colleen Hoover Books at €9.99c | In-store & Online
Selected Colleen Hoover Books at €9.99c | In-store & Online
A01=Travis Goodspeed
Age Group_Uncategorized
Age Group_Uncategorized
Author_Travis Goodspeed
automatic-update
Category1=Non-Fiction
Category=UM
COP=United States
Delivery_Delivery within 10-20 working days
Language_English
PA=In stock
Price_€50 to €100
PS=Active
softlaunch

Microcontroller Exploits

English

By (author): Travis Goodspeed

In this advanced guide to hardware hacking, you'll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted. This book documents a very wide variety of microchip hacking techniques; it's not a beginner's first introduction. You'll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You'll see how the STM32F1's exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash. For each exploit, you'll learn how to reproduce the results, dumping a chip in your own lab. In the second half of the book you'll find an encyclopaedic survey of vulnerabilities, indexed and cross referenced for use in practicing hardware security. See more
Current price €56.99
Original price €59.99
Save 5%
A01=Travis GoodspeedAge Group_UncategorizedAuthor_Travis Goodspeedautomatic-updateCategory1=Non-FictionCategory=UMCOP=United StatesDelivery_Delivery within 10-20 working daysLanguage_EnglishPA=In stockPrice_€50 to €100PS=Activesoftlaunch
Delivery/Collection within 10-20 working days
Product Details
  • Dimensions: 160 x 220mm
  • Publication Date: 10 Sep 2024
  • Publisher: No Starch PressUS
  • Publication City/Country: United States
  • Language: English
  • ISBN13: 9781718503885

About Travis Goodspeed

Travis Goodspeed is an embedded systems reverse engineer from Tennessee where he drives a Studebaker and collects memory extraction exploits for microcontrollers. His recent projects include a function recognizer for Thumb2 firmware a fresh memory corruption exploit for a 90's smart card and a CAD tool for extracting bits from mask ROM photographs.

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept