Linux on ARM dominates embedded and mobile markets. Consumer devices such as smartphones, portable tablets, and set top boxes are increasingly being used and accessed by Linux applications. Unfortunately, this makes them an attractive target for hackers who seek to tamper and reverse-engineer the application for nefarious goals such as intellectual property (IP) theft, DRM compromise and piracy.
Embedded and Mobile Apps are Vulnerable
Readily available toolkits are used by hackers to compromise mobile and embedded Linux code through:
- or debugging
Rapid, global distribution which facilitates sophisticated global collaboration of cybergangs