(linked from http://breakingembeddedsoftware.com Jon D. Hagar)
My book "Software Test Attacks to Break Mobile and Embedded Software" defines attacks that are applicable for mobile and smart phone devices.
It is important to note that most people, upon seeing the word “mobile,” think it is synonymous with Smart phones. However, mobile includes more than just smart phones, for example:
Somewhat arbitrary, we draw a distinction between mobile and embedded systems particularly mobile devices which tend to have a more sophisticated User Interface (UI) or Graphical UI (GUI). This characterization is not clean and is why we see mobile and embedded as part of a continuum. The tester must decide where their specific context places them.
Certainly Smart phones and other devices (now tablets) are in a space between personal computers and embedded systems. Smart phones are mobile. They have sensors (or can have). The limitations such as battery or power, screen sizes, network connections, memory limitations, storage issues, and others are often solved in the PC world by a simple upgrade or add-on. Not so for these little gizmos.
Here is a list of applicable attacks from my book "Software Test Attacks to Break Mobile and Embedded Systems" for mobile and smart phone devices: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 32, 33
Follow me on my blogBreaking Embedded Software Blog