ABSTRACT

Many embedded devices-even mobile ones are controlling something (see the robot in Figure 3.1). In this book, a large number of attacks are on the control features of the embedded soware. However, these kinds of attacks usually need to be done at the system level, meaning the hardware, environments, and user operations will need to be included for realistic results.