Books & Videos

Table of Contents

  1. The Source

    1. Chapter 1 I Can Hear You Typing

      1. The Need for Randomness
      2. The Security of Random Number Generators
      3. I/O Entropy: This Is Your Mouse Speaking
      4. Entropy Is a Terrible Thing to Waste
      5. Attack: The Implications of a Sudden Paradigm Shift
      6. Food for Thought
    2. Chapter 2 Extra Efforts Never Go Unnoticed

      1. Boole’s Heritage
      2. Toward the Universal Operator
      3. Toward the Material World
      4. A Nonelectric Computer
      5. A Marginally More Popular Computer Design
      6. From Logic Operators to Calculations
      7. From Electronic Egg Timer to Computer
      8. Turing and Instruction Set Complexity
      9. Implications: Subtle Differences
      10. In Practice
      11. Prevention
      12. Food for Thought
    3. Chapter 3 Ten Heads of the Hydra

      1. Revealing Emissions: TEMPEST in the TV
      2. Privacy, Limited
    4. Chapter 4 Working for the Common Good

  2. Safe Harbor

    1. Chapter 5 Blinkenlights

      1. The Art of Transmitting Data
      2. The Implications of Aesthetics
      3. Building Your Own Spy Gear . . .
      4. . . . And Using It with a Computer
      5. Preventing Blinkenlights Data Disclosure—and Why It Will Fail
      6. Food for Thought
    2. Chapter 6 Echoes of the Past

      1. Building the Tower of Babel
      2. The Missing Sentence
      3. Food for Thought
    3. Chapter 7 Secure in Switched Networks

      1. Some Theory
      2. Attacking the Architecture
      3. Prevention of Attacks
      4. Food for Thought
    4. Chapter 8 Us versus Them

      1. Logical Blinkenlights and Their Unusual Application
      2. The Unexpected Bits: Personal Data All Around
      3. Wi-Fi Vulnerabilities
  3. Out in the Wild

    1. Chapter 9 Foreign Accent

      1. The Language of the Internet
      2. Internet Protocol
      3. Beyond Internet Protocol
      4. User Datagram Protocol
      5. Transmission Control Protocol Packets
      6. Internet Control Message Protocol Packets
      7. Enter Passive Fingerprinting
      8. Passive Fingerprinting in Practice
      9. Exploring Passive-Fingerprinting Applications
      10. Prevention of Fingerprinting
      11. Food for Thought: The Fatal Flaw of IP Fragmentation
    2. Chapter 10 Advanced Sheep-Counting Strategies

      1. Benefits and Liabilities of Traditional Passive Fingerprinting
      2. A Brief History of Sequence Numbers
      3. Getting More Out of Sequence Numbers
      4. Delayed Coordinates: Taking Pictures of Time Sequences
      5. Pretty Pictures: TCP/IP Stack Gallery
      6. Attacking with Attractors
      7. Back to System Fingerprinting
      8. Preventing Passive Analysis
      9. Food for Thought
    3. Chapter 11 In Recognition of Anomalies

      1. Packet Firewall Basics
      2. The Consequences of Masquerading
      3. Segment Size Roulette
      4. Stateful Tracking and Unexpected Responses
      5. Reliability or Performance: The DF Bit Controversy
      6. Food for Thought
    4. Chapter 12 Stack Data Leaks

      1. Kristjan’s Server
      2. Surprising Findings
      3. Revelation: Phenomenon Reproduced
      4. Food for Thought
    5. Chapter 13 Smoke and Mirrors

      1. Abusing IP: Advanced Port Scanning
      2. Defense against Idle Scanning
      3. Food for Thought
    6. Chapter 14 Client Identification: Papers, Please!

      1. Camouflage
      2. A (Very) Brief History of the Web
      3. A HyperText Transfer Protocol Primer
      4. Making HTTP Better
      5. Uncovering Treasons
      6. Prevention
      7. Food for Thought
    7. Chapter 15 The Benefits of Being a Victim

      1. Defining Attacker Metrics
      2. Protecting Yourself: Observing Observations
      3. Food for Thought
  4. The Big Picture

    1. Chapter 16 Parasitic Computing, or How Pennies Add Up

      1. Nibbling at the CPU
      2. Practical Considerations
      3. Parasitic Storage: The Early Days
      4. Making Parasitic Storage Feasible
      5. Applications, Social Considerations, and Defense
      6. Food for Thought
    2. Chapter 17 Topology of the Network

      1. Capturing the Moment
      2. Using Topology Data for Origin Identification
      3. Network Triangulation with Mesh-Type Topology Data
      4. Network Stress Analysis
      5. Food for Thought
    3. Chapter 18 Watching the Void

      1. Direct Observation Tactics
      2. Attack Fallout Traffic Analysis
      3. Detecting Malformed or Misdirected Data
      4. Food for Thought
  1. Appendix Closing Words

  2. Appendix Bibliographic Notes

  3. Updates