Chapter 3

Control System Attacks

Many embedded devices—even mobile ones are controlling something (see the robot in Figure 3.1). In this book, a large number of attacks are on the control features of the embedded software. However, these kinds of attacks usually need to be done at the system level, meaning the hardware, environments, and user operations will need to be included for realistic results.

Figure 3.1

Image of Example robot.

Example robot.

Table 3.1 lists the control system attacks and examples of where they might map into mobile and embedded contexts.

Table 3.1

Map of Control System Attacks to Types of Mobile and Embedded Software

Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.