O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E: Detailed Mapping of Attacks

I am often asked which attacks apply in some context. There are many context areas, and everyone will have different attacks to consider. While every test team should plan and consider a variety of test concepts, strategies, plans, and supporting attacks, it is useful for many of you who are new to the idea of attack-based testing to see a mapping of attacks to a context, which might be close to their respective test problem.

Table E.1 is provided as a sample starting point for attacks that you should consider. Many people may read the table and a context and say “why that attack and not another?” This mapping is based on my experience and a lot of years of teaching classes, where people from different ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required