O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Generic Attacks

Most of the attacks in this book have been targeted at specific bugs or situations found in the error taxonomy (Appendix A). This is not totally true for the following attacks: Attack 1 Static Code Analysis (SCA), which targets many bug types that this analysis could find; Attack 17 Simulation and Stimulation, which can be used in combination with other attacks as well as against the lab; and Attack 20 Scenario, Story and Tours, which included the aspect of time sequences (stories) of events, which could be used in many situations.

The final two attacks of this book are even more “generic” in that their patterns can be used standalone or in combination with other attacks. These attacks are important additions to any ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required