Skip to main content

Monday, June 8, 2015 - 1:00pm - 4:30pm
Half-day Tutorials

Test Attacks to Break Mobile and Embedded Software NEW Prior Year Content

In the tradition of James Whittaker’s book series How to Break Software, Jon Hagar applies the testing “attack” concept to the domain of mobile and embedded software systems. First, Jon defines the environments of mobile and embedded software. He then examines the issues of software product failures caused by defects found in these types of software. Next, Jon shares a set of attacks against mobile and embedded software based on common modes of failure that teams can direct against their software. Like different kinds of software design patterns, attacks are test design patterns that must be customized for particular contexts. For specific attacks, Jon explains when and how to conduct the attack—and why the attack works to find bugs. In addition to learning these testing concepts, you can practice the attack patterns on devices containing mobile and/or embedded software―so bring your smart phones.

3.75 PMI® PDUs
Jon Hagar
Jon Hagar, Grand Software Testing

Jon Hagar is a systems-software engineer and tester consultant supporting software product integrity and verification and validation, with a specialization in embedded and mobile software systems. For more than thirty years Jon has worked in software engineering, particularly testing, supporting projects including control systems (avionics and auto), spacecraft, mobile-smart devices, IT, and attack testing of smart phones. Jon has built and managed embedded test labs with test automation, publishes and speaks regularly with more than fifty presentations and papers, and authored Software Test Attacks to Break Mobile and Embedded Devices, a new book on mobile/embedded software.

read more