Chapter 4

Hardware Software Attacks

This series of attacks are conducted on the software but aimed at bugs that have their origin in the hardware. So while they are not hardware testing per se because of the mobile and embedded hardware–software dependencies, you should “think” hardware first.

Here again, these attacks have differing applicability within the mobile and embedded contexts as shown in Table 4.1. These attacks are usually more applicable to “embedded” devices, but many mobile wireless devices have context, which demand these kinds of attacks such as mobile wireless medical devices.

Table 4.1

Map of Hardware–Software Attacks to Mobile or Embedded Contexts

Context →

Mobile and Smart Wireless Devices ...

Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.