Hardware Reference
In-Depth Information
Resources
Computer Related Risks
, by Peter G. Neumann (Addison-Wesley, 1994). This topic cata-
logs a plethora of engineering failures and provides answers to the question, “What can go
wrong?” It is as relevant today as it was when first published.
Hacking the Xbox
, by Bunnie Huang. Available for free at No Starch Press
(
www.nostarch.com/xbox.htm
)
. This should be your first stop on hardware reverse engin-
eering. In addition to being a great all-around topic, it clearly shows how even big com-
panies, like Microsoft, make devastating security mistakes.
(In)Security in Home Embedded Devices
, by Jim Gettys (
http://cyber.law.harvard.edu/
events/luncheon/2014/06/gettys
)
. An hour-video, presented at the Berkman Center for In-
ternet & Society at Harvard University, on the social and policy issues with regard to
home devices.
“The Internet of Things Is Wildly Insecure—and Often Unpatchable,” by Bruce Sch-
While it focuses on routers, this article succinctly captures why the embedded world
needs to care about security.