O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1

Setting the Mobile and Embedded Framework

Before we dive into the attacks, let us look at some of the definitions and implications for mobile and embedded software and some general advice to testers.

Objectives of Testing Mobile and Embedded Software Systems

“The best defense is a good offense.” Attack! How many times have you heard that phrase used? This book presents attack concepts to find common bugs found in mobile and embedded software, which testers of software systems are charged with finding. In James Whittaker’s How to Break Software book series [1–3], he shared a “fault model” approach, presenting an attack concept from which to test software. This book emphasizes the attack approach to the handheld mobile and embedded software ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required