March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• Static analysis of vulnerabilities in embedded devices
• Dynamic analysis with hardware
• Dynamic analysis with emulation
This chapter covers exploiting embedded devices. This topic is becoming increasingly important with the emergence of the Internet of Things (IoT), as covered in previous chapters. From elevators to cars, toasters, and everything “smart,” embedded devices are becoming ubiquitous, and the security vulnerabilities and threats are becoming innumerable. As Bruce Schneier has observed, it is like the Wild West of the 1990s all over again; everywhere we look, there are vulnerabilities in these embedded devices. Schneier explains that ...