Code, Chips and Control
Code, Chips and Control
The Security Posture of Digital Isolation
About the Book
Through the lens of the top 100 hacks since 1985, learn cybersecurity through real-world examples of what went wrong to convince us of “best practices". This is the cybersecurity book to understand the modern moment of digital defense, and the hacks that made it happen.
From the ghosts of Spectre and Meltdown to the shadowy supply chains behind modern semiconductors, the story of compute infrastructure is full of haunting breaches and spectral vulnerabilities that refuse to rest in peace. This is a book that slows those moments down and shows us how to think about how we build threat models with isolation in mind from hardware to runtime, from data centers to satellites.
We go through in the order that considers how security threat models work at every level, and what attacks enjoyed exploiting the gaps in their threat models over time. We start with how the world builds chips, and historical hardware level vulnerabilities. Then we’ll chat about the evolution of security proofs, and unlock the power of zero-trust architecture. Then we get to understand the politics and time pressure of the days that have affected coordinated discloser of a zero-day events in the past to see how improve them for the future. After that? We look at chips to go to the end of the universe to be secure and resilient when the most likely adversary is cosmic radiation. It’s a wild ride, join in:
Chapter One: The origins and Evolution of Semiconductor Technology and Architecture
Chapter Two: Kernels: Architecture, Security and Governance
Chapter Three: The Spectre of Vulnerability
Chapter Four: Embedded Systems in the Devices Around Us
Chapter Five: Disclosure Diplomacy: Vulnerabilities and Security Interests
Chapter Six: The Babylon Tower and Knowing What We Know
Chapter Seven: Hypervisors and the Politics of Virtualisation
Chapter Eight: Chips at the Edge of the Universe
Team Discounts
Get a team discount on this book!
Table of Contents
- Introduction
- About the Cover
- Chapter One: The Origins and Evolution of Semiconductor Technology and Architecture
- Chip Architecture
- Industry Milestones and Shifts in Leadership
- Regional Perspectives
- Supply Chain Vulnerabilities and Risks
- Commercial Giants and Real World Applications
- Regulatory and Policy Responses Today
- Things Coming Soon
- Silicon: The Strategic Substrate of the 21st Century
- Chapter Two: Kernels: Architecture, Security and Governance
- Computational Animus
- History of Kernels
- How Kernels Operate on a Chip
- FreeBSD: The Careful Cousin
- Kernel-Level Privacy and Surveillance Concerns
- $Sys$ Distopia
- Supply Chain Security in Kernel Development
- Kernel Performance, a race for Optimisations
- Kernel Vulnerabilities: When there really is a Ghost in the Machine
- Kernel Updates in National Security Contexts
- From Kernel Guarantees to Silicon Ghosts
- Chapter Three: The Spectre of Vulnerability
- Rowhammer and Flip Feng Shui
- Variations on Rowhammer
- How to Fix It
- Thunderclap
- Mitigating Memory Issues
- The Firmware Supply Chain
- Industry and Government Responses
- Geopolitical Tensions and Hardware Sovereignty
- Trust in Manufacturing
- From Core to Edge, Expanding the Hardware Security perimeter
- Chapter Four: Embedded Systems in the Devices Around Us
- Understanding the Threat Landscape and Constraints
- Security Architecture of Embedded Devices
- Lifecycle and Supply Chain at the Edge
- Regulatory and Policy Frameworks
- Emerging Topics in Embedded
- Embedded Security Evolves
- Threat Modeling at Scale
- Emerging Trends of Embedded Security
- Foundations of Digital Trust in Embedded Security
- Chapter Five: Disclosure Diplomacy: Vulnerabilities and Security Interests
- A System of Incredible Complexity
- Immunity in Information: Response and Relay
- The MOVEit Vulnerability and Lessons from Disclosure Timing
- Lessons from Past Vulnerability Disclosures
- The Real-World Disclosure Lifecycle: A Technical Ecosystem
- The Economics of Vulnerability
- Measuring Disclosure
- The Shadow Statistics
- Protestware and the Ethics of Weaponized Code
- What We Still Owe The World
- A Minimal Program for the Next Decade
- Chapter Six: The Babylon Tower and Knowing What We Know
- Syntax Level Threat Model
- Formal Methods: Writing Proofs of Safety
- The Grammar of Security: Primitives and Their Expression
- Chapter Seven: Hypervisors and the Politics of Virtualisation
- Cloud Service Providers
- Cloud VS Escape Artists
- Security is a Reflex that We Learn
- Compliant Hypervisors
- A New Threat Model
- The Modern Digital Age: Under Construction
- Chapter Eight: Chips at the Edge of the Universe
- Silicon to Space
- Subsidy and Venture
- Economics of the Infinite
- ISS: Code and Cooperation
- Time: The Hidden Protocol
- Final Thoughts: Lessons from Orbit
- Sovereignty Pattern: What to Share, What to Guard
- Introduction
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them