O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Smart and/or Mobile Phone Attacks

Following up from the user interface (UI) section, the world of mobile–embedded software has been changing and expanding to include devices with more capabilities and features. This moves mobile–embedded closer to the personal computer (PC) and information technology (IT) world. There are now no clear boundaries between mobile, embedded, and IT software. The evolution is seen in control systems with graphical user interfaces (GUIs), phones, tablets, and other devices once thought of as “ purely embedded,” but are now taking on many characteristics, and hence the potential problems of the PC and IT world, due to cheap and powerful processors as well as massive memory. While these devices take on features ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required