O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Control System Attacks

Many embedded devices—even mobile ones are controlling something (see the robot in Figure 3.1). In this book, a large number of attacks are on the control features of the embedded software. However, these kinds of attacks usually need to be done at the system level, meaning the hardware, environments, and user operations will need to be included for realistic results.

Figure 3.1

Image of Example robot.

Example robot.

Table 3.1 lists the control system attacks and examples of where they might map into mobile and embedded contexts.

Table 3.1

Map of Control System Attacks to Types of Mobile and Embedded Software

Context ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required