Chapter 4
Hardware Software Attacks
This series of attacks are conducted on the software but aimed at bugs that have their origin in the hardware. So while they are not hardware testing per se because of the mobile and embedded hardwareâsoftware dependencies, you should âthinkâ hardware first.
Here again, these attacks have differing applicability within the mobile and embedded contexts as shown in Table 4.1. These attacks are usually more applicable to âembeddedâ devices, but many mobile wireless devices have context, which demand these kinds of attacks such as mobile wireless medical devices.
Table 4.1
Map of HardwareâSoftware Attacks to Mobile or Embedded Contexts
Context â |
Mobile and Smart Wireless Devices ... |
Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.