O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Mobile/Embedded Security

Large levels of software now exist in mobile and embedded devices such as smart phones, airplanes, factories, medical devices, robots, and many other consumer products. The communication between these devices and the outside world gives rise to security concerns. Until recently, hackers and the security world did not worry too much about such devices. They were too few, not well connected to the outside world, and did not have much interesting information. Now, all of that has changed. Security hacking can cause substantial financial and human losses as well as loss of integrity and system functionality. Security constitutes a risk for many mobile–embedded systems; therefore, testers of at-risk systems should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required