Chapter 8: Software attacks and threat modeling

Abstract

This chapter will consider how a small embedded system may be attacked by exploiting software “loopholes” in your application code. Many of the techniques described in this chapter are routinely used to “hack” large computer systems, which feature standard operating systems and standard software packages. It may seem fanciful that a small embedded system with few resources running bespoke code can be attacked in the same way, and historically, this has indeed been true. With the explosive growth of IoT systems that deploy vast fleets of devices with a common codebase, IoT devices are becoming a worthwhile target. It is highly likely that through your career, you have mainly been concerned ...

Get Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.