Abstract
In this chapter, we have a look at two of the other (apart from UART) most common serial protocols, namely I2C (pronounced I-2-C or I-square-C) and SPI, and see how they are useful for our security research and exploitation of IoT devices. Both SPI and I2C are useful bus protocols used for data communications between different components in an embedded device circuit. SPI and I2C have many similarities and a couple of differences in the way they function and how we interact with them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Aditya Gupta
About this chapter
Cite this chapter
Gupta, A. (2019). Exploitation Using I2C and SPI. In: The IoT Hacker's Handbook. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4300-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4300-8_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4299-5
Online ISBN: 978-1-4842-4300-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books