Chapter 5

Mobile and Embedded Software Attacks

So far, I have presented attacks that can be used on embedded systems with a focus on developer testing, controls, and system-hardware areas, as well as a few attacks that are “cross-over,” in that they can be applied to either mobile or embedded smart devices. Now, let us start looking directly into the mobile and embedded domains. As I stated previously, the embedded world blends into the mobile smart domain, which in turn blends into the domains of software such as web, information technology (IT), and personal computer (PC). I expand this blending here.

Table 5.1 lists the attacks of this chapter and how they relate to different mobile and embedded contexts. If you are expecting perfect or clean ...

Get Software Test Attacks to Break Mobile and Embedded Devices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.