Hardware Reference
In-Depth Information
Resources
Computer Related Risks , by Peter G. Neumann (Addison-Wesley, 1994). This topic cata-
logs a plethora of engineering failures and provides answers to the question, “What can go
wrong?” It is as relevant today as it was when first published.
Hacking the Xbox , by Bunnie Huang. Available for free at No Starch Press
( www.nostarch.com/xbox.htm ) . This should be your first stop on hardware reverse engin-
eering. In addition to being a great all-around topic, it clearly shows how even big com-
panies, like Microsoft, make devastating security mistakes.
(In)Security in Home Embedded Devices , by Jim Gettys ( http://cyber.law.harvard.edu/
events/luncheon/2014/06/gettys ) . An hour-video, presented at the Berkman Center for In-
ternet & Society at Harvard University, on the social and policy issues with regard to
home devices.
“The Internet of Things Is Wildly Insecure—and Often Unpatchable,” by Bruce Sch-
neier ( https://www.schneier.com/essays/archives/2014/01/the_internet_of_thin.html ) .
While it focuses on routers, this article succinctly captures why the embedded world
needs to care about security.
Search WWH ::




Custom Search