O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Mobile and Embedded Software Attacks

So far, I have presented attacks that can be used on embedded systems with a focus on developer testing, controls, and system-hardware areas, as well as a few attacks that are “cross-over,” in that they can be applied to either mobile or embedded smart devices. Now, let us start looking directly into the mobile and embedded domains. As I stated previously, the embedded world blends into the mobile smart domain, which in turn blends into the domains of software such as web, information technology (IT), and personal computer (PC). I expand this blending here.

Table 5.1 lists the attacks of this chapter and how they relate to different mobile and embedded contexts. If you are expecting perfect or clean ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required