Book description
In this advanced guide to hardware hacking, you’ll learn how to read the software out of single chip computers, especially when they are configured not to allow the firmware to be extracted.
This book documents a very wide variety of microchip hacking techniques; it’s not a beginner’s first introduction.
You’ll start off by exploring detailed techniques for hacking real-world chips, such as how the STM32F0 allows for one word to be dumped after every reset. You’ll see how the STM32F1’s exception handling can slowly leak the firmware out over an hour, and how the Texas Instruments MSP430 firmware can be extracted by a camera flash.
For each exploit, you’ll learn how to reproduce the results, dumping a chip in your own lab.
In the second half of the book, you’ll find an encyclopedic survey of vulnerabilities, indexed and cross-referenced for use in practicing hardware security.
Publisher resources
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- Contents
- Introduction
- 1 Basics of Memory Extraction
- 2 STM32F217 DFU Exit
- 3 MD380 Null Pointer, DFU
- 4 LPC1343 Call Stack
- 5 Ledger Nano S, 0xF00DBABE
- 6 NipPEr Is a buTt liCkeR
- 7 RF430 Backdoors
- 8 Basics of JTAG and ICSP
- 9 nRF51 Gadgets in ROM
- 10 STM32F0 SWD Word Leak
- 11 STM32F1 Interrupt Jigsaw
- 12 PIC18F452 ICSP and HID
- 13 Basics of Glitching
- 14 MC13224, the Simplest Fault Injection
- 15 LPC1114 Bootloader Glitch
- 16 nRF52 APPROTECT Glitch
- 17 STM32 FPB Glitch
- 18 Chip Decapsulation
- 19 PIC Ultraviolet Unlock
- 20 MSP430 Paparazzi Attack
- 21 CMOS VLSI Interlude
- 22 Mask ROM Photography
- 23 Game Boy Via ROM
- 24 Clipper Chip Diffusion ROM
- 25 Nintendo CIC and Clones
-
A More Bootloader Vulns
- A.1 PN553 Signature Bypass
- A.2 Tegra X1, Fusée Gelée
- A.3 LPC55S69, K82 USB Overread
- A.4 CH552 Verify Command
- A.5 BCM61650/PRC6000 Headers
- A.6 PSoC4 Flash Doubler
- A.7 i.MX53 Overflow in Bootloader
- A.8 M16C Bootloader Timing Attack
- A.9 IC204 Bypass by Magic Number
- A.10 Zynq 7000 Bootloader Dumping
- A.11 Zynq 7000 NAND/ONFI
- A.12 Zynq 7000 BOOT.BIN Parsing
- A.13 TMP91 Password
- B More Debugger Attacks
- C More Privilege Escalation
- D More Invasive Attacks
-
E More Fault Injections
- E.1 Java Card Invalid Bytecode
- E.2 L11, M2351, LPC55 CrowRBAR
- E.3 68HC705 and 6805
- E.4 Super Game Boy and GB Color
- E.5 STM32F2 Chip.Fail and Kraken
- E.6 STM8 Bootloader and SWIM
- E.7 STM32F1/F3 Shaping the Glitch
- E.8 MSP430F5172 Glitch Per Word
- E.9 CC2640 CC2652 eFuses
- E.10 LC87 Unlooping over USB
- E.11 78K0 Glitching Checksums
- E.12 RX65 Bootloader Glitching
- E.13 GPLB52X Tamagotchi
- E.14 MC9S12 Reset Glitch
- E.15 Nvidia Tegra X2
- E.16 Zynq 7000 ROM Dump Glitch
- E.17 STM32 Body Biasing Injection
- E.18 PCF7941 Erasure
- E.19 EFM32WG without a Brownout
- E.20 MPC55 by EMFI
- F More Test Modes
- G More ROM Photography
- H Unsorted Attacks
- I Other Chips
- Thank you, kindly
- Bibliography
- Index
- Colophon
- Footnotes
Product information
- Title: Microcontroller Exploits
- Author(s):
- Release date: September 2024
- Publisher(s): No Starch Press
- ISBN: 9781718503885
You might also like
book
Hands-On RTOS with Microcontrollers
Build a strong foundation in designing and implementing real-time systems with the help of practical examples …
book
Hands-On RTOS with Microcontrollers - Second Edition
A comprehensive guide designed to provide practical kills and insights to supercharge your embedded engineering journey …
book
Linux System Programming Techniques
Find solutions to all your problems related to Linux system programming using practical recipes for developing …
book
Practical IoT Hacking
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches …