Code, Chips and Control
$29.00
Minimum price
$39.00
Suggested price

Code, Chips and Control

The Security Posture of Digital Isolation

About the Book

Through the lens of the top 100 hacks since 1985, learn cybersecurity through real-world examples of what went wrong to convince us of “best practices". This is the cybersecurity book to understand the modern moment of digital defense, and the hacks that made it happen.

From the ghosts of Spectre and Meltdown to the shadowy supply chains behind modern semiconductors, the story of compute infrastructure is full of haunting breaches and spectral vulnerabilities that refuse to rest in peace. This is a book that slows those moments down and shows us how to think about how we build threat models with isolation in mind from hardware to runtime, from data centers to satellites.

We go through in the order that considers how security threat models work at every level, and what attacks enjoyed exploiting the gaps in their threat models over time. We start with how the world builds chips, and historical hardware level vulnerabilities. Then we’ll chat about the evolution of security proofs, and unlock the power of zero-trust architecture. Then we get to understand the politics and time pressure of the days that have affected coordinated discloser of a zero-day events in the past to see how improve them for the future. After that? We look at chips to go to the end of the universe to be secure and resilient when the most likely adversary is cosmic radiation. It’s a wild ride, join in:

Chapter One: The origins and Evolution of Semiconductor Technology and Architecture

Chapter Two: Kernels: Architecture, Security and Governance

Chapter Three: The Spectre of Vulnerability

Chapter Four: Embedded Systems in the Devices Around Us

Chapter Five: Disclosure Diplomacy: Vulnerabilities and Security Interests

Chapter Six: The Babylon Tower and Knowing What We Know

Chapter Seven: Hypervisors and the Politics of Virtualisation

Chapter Eight: Chips at the Edge of the Universe

About the Author

Sal Kimmich
Sal Kimmich

Sal Kimmich is a privacy and security subject-matter expert and open-source developer and mentor. They’ve led security-by-design across cloud, HPC, and AI: embedding ISO 27001 practices, OpenSSF methods, and confidential computing into real projects. Their work spans developer advocacy at Sonatype, technical direction at GadflyAI, and a privacy advisory role with OurWorlds. Sal became an open source nerd during their years working with NeuroDebian and bash scripting into supercomputers at the U.S. National Institutes of Health. Current recognitions include UK Top 50 Open Source Contributor (2023), a shortlist for Security Woman of the Year (2024), and avid member of the Stone Club UK.

Team Discounts

Get a team discount on this book!

Up to 3 Team Members
Minimum price$69.00Suggested price$99.00
Up to 5 Team Members
Minimum price$119.00Suggested price$149.00
Up to 10 Team Members
Minimum price$199.00Suggested price$249.00
Up to 15 Team Members
Minimum price$299.00Suggested price$399.00
Up to 25 Team Members
Minimum price$399.00Suggested price$549.00

Table of Contents

    • Introduction
      • About the Cover
    • Chapter One: The Origins and Evolution of Semiconductor Technology and Architecture
      • Chip Architecture
      • Industry Milestones and Shifts in Leadership
      • Regional Perspectives
      • Supply Chain Vulnerabilities and Risks
      • Commercial Giants and Real World Applications
      • Regulatory and Policy Responses Today
      • Things Coming Soon
      • Silicon: The Strategic Substrate of the 21st Century
    • Chapter Two: Kernels: Architecture, Security and Governance
      • Computational Animus
      • History of Kernels
      • How Kernels Operate on a Chip
      • FreeBSD: The Careful Cousin
      • Kernel-Level Privacy and Surveillance Concerns
      • $Sys$ Distopia
      • Supply Chain Security in Kernel Development
      • Kernel Performance, a race for Optimisations
      • Kernel Vulnerabilities: When there really is a Ghost in the Machine
      • Kernel Updates in National Security Contexts
      • From Kernel Guarantees to Silicon Ghosts
    • Chapter Three: The Spectre of Vulnerability
      • Rowhammer and Flip Feng Shui
      • Variations on Rowhammer
      • How to Fix It
      • Thunderclap
      • Mitigating Memory Issues
      • The Firmware Supply Chain
      • Industry and Government Responses
      • Geopolitical Tensions and Hardware Sovereignty
      • Trust in Manufacturing
      • From Core to Edge, Expanding the Hardware Security perimeter
    • Chapter Four: Embedded Systems in the Devices Around Us
      • Understanding the Threat Landscape and Constraints
      • Security Architecture of Embedded Devices
      • Lifecycle and Supply Chain at the Edge
      • Regulatory and Policy Frameworks
      • Emerging Topics in Embedded
      • Embedded Security Evolves
      • Threat Modeling at Scale
      • Emerging Trends of Embedded Security
      • Foundations of Digital Trust in Embedded Security
    • Chapter Five: Disclosure Diplomacy: Vulnerabilities and Security Interests
      • A System of Incredible Complexity
      • Immunity in Information: Response and Relay
      • The MOVEit Vulnerability and Lessons from Disclosure Timing
      • Lessons from Past Vulnerability Disclosures
      • The Real-World Disclosure Lifecycle: A Technical Ecosystem
      • The Economics of Vulnerability
      • Measuring Disclosure
      • The Shadow Statistics
      • Protestware and the Ethics of Weaponized Code
      • What We Still Owe The World
      • A Minimal Program for the Next Decade
    • Chapter Six: The Babylon Tower and Knowing What We Know
      • Syntax Level Threat Model
      • Formal Methods: Writing Proofs of Safety
      • The Grammar of Security: Primitives and Their Expression
    • Chapter Seven: Hypervisors and the Politics of Virtualisation
      • Cloud Service Providers
      • Cloud VS Escape Artists
      • Security is a Reflex that We Learn
      • Compliant Hypervisors
      • A New Threat Model
      • The Modern Digital Age: Under Construction
    • Chapter Eight: Chips at the Edge of the Universe
      • Silicon to Space
      • Subsidy and Venture
      • Economics of the Infinite
      • ISS: Code and Cooperation
      • Time: The Hidden Protocol
      • Final Thoughts: Lessons from Orbit
      • Sovereignty Pattern: What to Share, What to Guard

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub