ABSTRACT

So far, I have presented attacks that can be used on embedded systems with a focus on developer testing, controls, and system-hardware areas, as well as a few attacks that are “cross-over,” in that they can be applied to either mobile or embedded smart devices. Now, let us start looking directly into the mobile and embedded domains. As I stated previously, the embedded world blends into the mobile smart domain, which in turn blends into the domains of soware such as web, information technology (IT), and personal computer (PC). I expand this blending here.