Mobile and Embedded Software Attacks
So far, I have presented attacks that can be used on embedded systems with a focus on developer testing, controls, and system-hardware areas, as well as a few attacks that are âcross-over,â in that they can be applied to either mobile or embedded smart devices. Now, let us start looking directly into the mobile and embedded domains. As I stated previously, the embedded world blends into the mobile smart domain, which in turn blends into the domains of software such as web, information technology (IT), and personal computer (PC). I expand this blending here.
Table 5.1 lists the attacks of this chapter and how they relate to different mobile and embedded contexts. If you are expecting perfect ...