Skip to main content


Monday, November 9, 2015 - 1:00pm - 4:30pm
Half-day Tutorials
ML

Test Attacks to Break Mobile, IoT, and Embedded Software NEW Prior Year Content

In the tradition of James Whittaker’s book series How to Break Software, Jon Hagar applies the testing “attack” concept to the domain of mobile, IoT, and embedded software systems. First, Jon defines the environments of mobile, IoT and embedded software. He then examines the issues of software product failures caused by defects found in these types of software. Next, Jon shares a set of ten attacks against mobile, IoT, and embedded software based on common modes of failure that teams can direct against their software today. Like software design patterns, attacks are test design patterns that must be customized for particular contexts. For specific attacks, Jon explains when and how to conduct the attack, who should conduct the attack, and why the attack works to find bugs. In addition to learning these testing concepts, attendees will get to practice the attack pattern on devices containing mobile, IoT and/or embedded software—so bring your smart phones.

Jon Hagar
Jon Hagar, Independent Consultant

Jon Hagar is an independent consultant working in software product integrity, testing, verification, and validation. For more than thirty-five years Jon has worked in software engineering, particularly testing, supporting projects which include control systems (avionics and auto), spacecraft, IoT, mobile-smart devices, and attack testing for smart phones. He authored Software Test Attacks to Break Mobile and Embedded Devices; has presented hundreds of classes and more than fifty conference presentations; and written numerous articles. Jon is an editor for ISO, IEEE, and OMG standards.

read more