CHAPTER 9HACKING HARDWARE

This book discusses at length logical threats to software across all levels, from application to system to network. But what about threats to the hardware and the physical protection mechanisms that safeguard the information assets they carry? This chapter reviews attacks on mechanisms that protect the devices themselves and provides an introduction to reverse engineering hardware devices to probe even deeper into the information they store.

Well-connected embedded devices are incredibly prevalent, whether it’s the ubiquitous mobile phone to the ever-popular iPad. From home to work to the coffee shop, a user may utilize the same device to access multiple networks via different mediums, including GSM, Wi-Fi, Bluetooth, ...

Get Hacking Exposed 7, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.