Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software test attacks to break mobile and embedded devices
Hagar J., Chapman & Hall/CRC, Boca Raton, FL, 2014. 377 pp. Type: Book (978-1-466575-30-1)
Date Reviewed: Feb 5 2014

If you are unfamiliar with other books that have “break” and “software” in their title, you might be forgiven for thinking that this book presents techniques for breaking into mobile and embedded devices. You would be wrong, however, for this is a book about testing such devices.

Following the lead of James Whittaker, who has written a series of books with similar titles [1,2], this author, an experienced software tester, describes diverse techniques for testing mobile and embedded devices from the perspective of an adversary. In traditional testing processes, a test plan is written according to the software specifications; in test-driven processes, the unit tests are written by developers. In contrast to those, the approach in this book is unapologetically (mostly) that of black-box testing. The tester gets a device (or its software) and tries to identify weaknesses.

After an introduction into the topic of testing mobile and embedded devices, the bulk of the book discusses testing the source code, the elements controlled by the software, the behavior associated with adverse hardware conditions, responses to abnormal data, timing properties, the user interface, the handling of third-party applications, and security. Three final chapters discuss combining diverse tests, setting up a testing laboratory, and working as a tester. The book concludes with a list of numerous references, a glossary, and an extensive index.

The author offers an interesting perspective on testing and a wealth of ideas for finding bugs that might be overlooked in a more traditional top-down or bottom-up testing strategy. However, readers may find the constant references to tests as “attacks” highly distracting and confusing. In addition, in many places, the writing is overly abstract or verbose, making it difficult to focus on the gems that hide within.

Sadly, the wafer-thin paper allows the text on one side of the page to show between the lines on the other side, and sidebars are situated on an off-putting, washed-out gray background. More attention to editing and production quality from the publisher would greatly improve this book. Despite this drawback, testers of mobile and embedded devices will find it to be a useful addition to their bookshelf.

More reviews about this item: Amazon

Reviewer:  D. Spinellis Review #: CR141973 (1405-0304)
1) Whittaker, J. A. How to break software: a practical guide to testing. Addison-Wesley, Boston, MA, 2002.
2) Andrews, M.; Whittaker, J. A. How to break web software: functional and security testing of web applications and web services. Addison-Wesley, Boston, MA, 2006.
Bookmark and Share
  Featured Reviewer  
 
Testing And Debugging (D.2.5 )
 
 
Mobile Processors (C.1.4 ... )
 
 
Portable Devices (C.5.3 ... )
 
 
Real-Time Systems And Embedded Systems (D.4.7 ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Testing And Debugging": Date
Software defect removal
Dunn R., McGraw-Hill, Inc., New York, NY, 1984. Type: Book (9789780070183131)
Mar 1 1985
On the optimum checkpoint selection problem
Toueg S., Babaoglu O. SIAM Journal on Computing 13(3): 630-649, 1984. Type: Article
Mar 1 1985
Software testing management
Royer T., Prentice-Hall, Inc., Upper Saddle River, NJ, 1993. Type: Book (9780135329870)
Mar 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud, Inc.®
Terms of Use
| Privacy Policy