Hardware Software Attacks
This series of attacks are conducted on the software but aimed at bugs that have their origin in the hardware. So while they are not hardware testing per se because of the mobile and embedded hardwareâsoftware dependencies, you should âthinkâ hardware first.
Here again, these attacks have differing applicability within the mobile and embedded contexts as shown in Table 4.1. These attacks are usually more applicable to âembeddedâ devices, but many mobile wireless devices have context, which demand these kinds of attacks such as mobile wireless medical devices.
Map of HardwareâSoftware Attacks to Mobile or Embedded Contexts
Mobile and Smart Wireless Devices ...