O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Developer Attacks

Taking the Code Head On

Thou shall covet thy developer’s source code.
James Whittaker
Ten Commandments of Software Testing [1]

I am not talking here about taking on your least favorite developer (or programmer). I am talking about getting developers to test the software or code that they write.

This chapter has attacks that many testers think should be “owned” by the developers. Some developers think that all testing is owned by a “test group.” These views are at odds. Ownership implies responsibility. The team owns the qualities of any product. Therefore, if a developer runs the attacks of this chapter, finds their own bugs, and fixes them, then the quality of the product is improved. In many cases, the developers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required