Chapter 3
Control System Attacks
Many embedded devices—even mobile ones are controlling something (see the robot in Figure 3.1). In this book, a large number of attacks are on the control features of the embedded software. However, these kinds of attacks usually need to be done at the system level, meaning the hardware, environments, and user operations will need to be included for realistic results.
Figure 3.1
Table 3.1 lists the control system attacks and examples of where they might map into mobile and embedded contexts.
Table 3.1
Map of Control System Attacks to Types of Mobile and Embedded Software
Context ... |
Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.