Hardware Security

Hardware Security#


Table of Contents#


Resources#

  • [ h ] Flipper Zero

  • [ h ] GL.iNet Beryl AX

    • [ y ] 12-28-2023. Crosstalk Solutions. “Travel Routers Improve Your Life! Beryl AX Complete Setup”.

    • [ y ] 09-25-2023. ShortCircuit. “I didn’t know I needed this - GL.iNet Beryl AX”.

    • [ y ] 07-27-2022. GLiNet. “How to Setup GL.iNet Routers for the First Time”.

  • [ h ] Great Scott Gadgets

  • [ h ] Hak5

  • [ h ] Outpost24

  • [ h ] SpyCentre


Texts#

  • Merli, Dominik. (2024). Engineering Secure Devices. No Starch Press.

  • Van Woudenberg, Jasper & Colin O’Flynn. (2021). The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks. No Starch Press.


Terms#

  • [ w ] Access Control

  • [ w ] Acoustic Cryptanalysis

  • [ w ] Automotive Hacking

  • [ w ] Electromagnetic Attack

  • [ w ] Hardware Backdoor

  • [ w ] Hardware Security

  • [ w ] Hardware Security Module (HSM)

  • [ w ] Hardware Trojan

  • [ w ] Hardware-Based Full Disk Encryption (FDE)

  • [ w ] Open-Source Hardware (OSH)

  • [ w ] Physical Unclonable Function (PUF)

  • [ w ] Power Analysis

  • [ w ] Secure Cryptoprocessor

  • [ w ] Security Switch

  • [ w ] Side-Channel Attack

  • [ w ] mart Card

  • [ w ] Supply Chain Security

  • [ w ] Timing Attack