AdvancedHardwareEmbeddedReverse Engineering

The Hardware Hacking Handbook

Breaking Embedded Security with Hardware Attacks

5 / 5

Jasper van Woudenberg and Colin O'Flynn (NewAE / ChipWhisperer) on real hardware attacks: bus sniffing, fault injection, side-channel power analysis, and the lab work that turns a black box into a known target.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2021
Publisher
No Starch Press
Pages
512
Language
English

Read this if

Embedded and IoT security researchers ready to move past firmware-only work and pick up the soldering iron. Also the right book for offensive practitioners auditing devices where the chip is the threat model: hardware wallets, automotive ECUs, smart locks, set-top boxes.

Skip this if

Readers who only want to read about hardware hacking. The book assumes you will buy a logic analyzer, a ChipWhisperer or similar, and break a few dev boards; without lab time, the middle chapters become abstract.

Key takeaways

  • Side-channel and fault-injection attacks are no longer exotic: with sub-$300 tooling, an attacker can pull keys from MCUs that ship in shipping products today.
  • Bus interception (UART, JTAG, SWD, SPI flash dumps) is the unglamorous workhorse of hardware research and pays for itself across nearly every target.
  • Threat modeling for hardware is fundamentally different from software: physical access changes the cost curve of every attack, and the chapters on adversary models reflect that.

Notes

Pair with Practical IoT Hacking (Chantzis et al.) for the network-layer continuation and Practical Reverse Engineering (Dang/Gazet/Bachaalany) for the firmware analysis side. The ChipWhisperer ecosystem (newae.com, chipwhisperer.io) is the canonical lab platform for the book's exercises and the authors' professional work. The Hardware Hacker (bunnie Huang) is the right cultural companion.