O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Hardware Software Attacks

This series of attacks are conducted on the software but aimed at bugs that have their origin in the hardware. So while they are not hardware testing per se because of the mobile and embedded hardware–software dependencies, you should “think” hardware first.

Here again, these attacks have differing applicability within the mobile and embedded contexts as shown in Table 4.1. These attacks are usually more applicable to “embedded” devices, but many mobile wireless devices have context, which demand these kinds of attacks such as mobile wireless medical devices.

Table 4.1

Map of Hardware–Software Attacks to Mobile or Embedded Contexts

Context →

Mobile and Smart Wireless Devices

Embedded (Simple) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required