Many embedded devices—even mobile ones are controlling something (see the robot in Figure 3.1). In this book, a large number of attacks are on the control features of the embedded software. However, these kinds of attacks usually need to be done at the system level, meaning the hardware, environments, and user operations will need to be included for realistic results.
Table 3.1 lists the control system attacks and examples of where they might map into mobile and embedded contexts.
Map of Control System Attacks to Types of Mobile and Embedded Software