04307oam 2200601 450 991082302210332120190911103513.01-4987-6014-70-429-07191-41-138-46844-41-4665-7530-19781138468443(OCoLC)862109669(MiFhGG)GVRL8QDQ(EXLCZ)99267000000039441720130606h20142014 uy 0engurun|---uuuuatxtccrSoftware test attacks to break mobile and embedded devices /Jon Duncan Hagar1st editionChapman & Hall/CRC [Imprint]Oct. 2017Boca Raton CRC Press LLCFlorence Taylor & Francis Group [distributor]Boca Raton :CRC Press,[2014]�20141 online resource (xxxi, 316 pages) illustrationsChapman & Hall/CRC Innovations in Software EngineeringDescription based upon print version of record.1-322-66757-8 1-4665-7531-X Includes bibliographical references.Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone AttacksChapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back CoverAnnotationAddress Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.Chapman & Hall/CRC innovations in software engineering and software development series.Penetration testing (Computer security)Mobile computingSecurity measuresEmbedded computer systemsSecurity measuresPenetration testing (Computer security)Mobile computingSecurity measures.Embedded computer systemsSecurity measures.005.14005.8COM051230COM053000MAT000000bisacshHagar Jon Duncan1235754CRC Press LLC.MiFhGGMiFhGGBOOK9910823022103321Software test attacks to break mobile and embedded devices4057990UNINA