Appendix E: Detailed Mapping of Attacks
I am often asked which attacks apply in some context. There are many context areas, and everyone will have different attacks to consider. While every test team should plan and consider a variety of test concepts, strategies, plans, and supporting attacks, it is useful for many of you who are new to the idea of attack-based testing to see a mapping of attacks to a context, which might be close to their respective test problem.
Table E.1 is provided as a sample starting point for attacks that you should consider. Many people may read the table and a context and say “why that attack and not another?” This mapping is based on my experience and a lot of years of teaching classes, where people from different ...
Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.