Description

Book Synopsis
The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Trade Review
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."
—Yifan Lu, Security Researcher

"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."
—Arya Voronova, Hackaday


Table of Contents
Introduction
Chapter 1: Dental Hygiene: Introduction to Embedded Security
Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
Chapter 3: Casing the Joint: Identifying Components and Gathering Information
Chapter 4: Bull in a China Shop: Introducing Fault Injection
Chapter 5: Don’t Lick the Probe: How to Inject Faults
Chapter 6: Bench Time: Fault Injection Lab
Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
Chapter 8: I’ve Got the Power: Introduction to Power Analysis
Chapter 9: Bench Time: Simple Power Analysis
Chapter 10: Splitting the Difference: Differential Power Analysis
Chapter 11: Advanced Power Analysis
Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
Chapter 13: No Kiddin’: Real-Life Examples
Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
Appendix B: All Your Base Are Belong to Us: Popular Pinouts

The Hardware Hacking Handbook: Breaking Embedded

Product form

£35.99

Includes FREE delivery

RRP £47.99 – you save £12.00 (25%)

Order before 4pm today for delivery by Tue 30 Dec 2025.

A Paperback / softback by Jasper van Woudenberg, Colin O'Flynn

3 in stock


    View other formats and editions of The Hardware Hacking Handbook: Breaking Embedded by Jasper van Woudenberg

    Publisher: No Starch Press,US
    Publication Date: 21/12/2021
    ISBN13: 9781593278748, 978-1593278748
    ISBN10: 1593278748

    Description

    Book Synopsis
    The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

    Trade Review
    "I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."
    —Yifan Lu, Security Researcher

    "One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."
    —Arya Voronova, Hackaday


    Table of Contents
    Introduction
    Chapter 1: Dental Hygiene: Introduction to Embedded Security
    Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces
    Chapter 3: Casing the Joint: Identifying Components and Gathering Information
    Chapter 4: Bull in a China Shop: Introducing Fault Injection
    Chapter 5: Don’t Lick the Probe: How to Inject Faults
    Chapter 6: Bench Time: Fault Injection Lab
    Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor
    Chapter 8: I’ve Got the Power: Introduction to Power Analysis
    Chapter 9: Bench Time: Simple Power Analysis
    Chapter 10: Splitting the Difference: Differential Power Analysis
    Chapter 11: Advanced Power Analysis
    Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader
    Chapter 13: No Kiddin’: Real-Life Examples
    Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes
    Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab
    Appendix B: All Your Base Are Belong to Us: Popular Pinouts

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account