Skip to main content


Embedded Testing

Tutorials

ML Test Attacks to Break Mobile, IoT, and Embedded Software NEW
Jon Hagar, Independent Consultant
Mon, 11/09/2015 - 1:00pm

In the tradition of James Whittaker’s book series How to Break Software, Jon Hagar applies the testing “attack” concept to the domain of mobile, IoT, and embedded software systems. First, Jon defines the environments of mobile, IoT and embedded software. He then examines the issues of software product failures caused by defects found in these types of software. Next, Jon shares a set of ten attacks against mobile, IoT, and embedded software based on common modes of failure that teams can direct against their software today. Like software design patterns, attacks are test design patterns that must be customized for particular contexts. For specific attacks, Jon explains when and how to conduct the attack, who should conduct the attack, and why the attack works to find bugs. In addition to learning these testing concepts, attendees will get to practice the attack pattern on devices containing mobile, IoT and/or embedded software—so bring your smart phones.

Read more