STAREAST 2017 Tutorial - Test Attacks to Break Mobile and Embedded Software | TechWell

SEE PRICING & PACKAGES

Monday, May 8, 2017 - 8:30am to 12:00pm

Test Attacks to Break Mobile and Embedded Software

Add to calendar

In the tradition of James Whittaker’s book series, How to Break Software, Jon Hagar applies the testing “attack” concept to mobile and embedded software systems. First, Jon defines the environments of mobile and embedded software. He then examines the issues of software product failures caused by defects found in these types of software. Next, Jon shares a set of attacks against mobile and embedded software based on common modes of failure that teams can direct against their software. Like different kinds of software design patterns, attacks are test design patterns that must be customized for particular contexts. For each attack, Jon explains when and how to conduct the test, as well as why it works to find bugs. In addition to learning these testing concepts, practice the attack patterns on devices containing mobile and/or embedded software―so bring your smart phones.

Jon_Hagar
Grand Software Testing

Jon Hagar is a systems software engineer and testing consultant, supporting software product integrity and verification and validation (V&V), with a specialization in mobile and embedded software system testing. For more than thirty years, Jon has worked in software testing and engineering projects. He authored Software Test Attacks to Break Mobile and Embedded Devices; consults, presents, teaches, and writes regularly in many forums on software testing and V&V; and is lead editor/author on committees including OMG UTP model-based test standard, IEEE 1012 V&V plans, and ISO/IEEE/IEC 29119 software test standard. Contact Jon at [email protected].