Who this book is for
This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development, will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of the Linux shell, compilation, and debugging.
The main intended audience of this book is early-career cybersecurity researchers or students that would like to get hands-on with the fuzzing of embedded software.
If that is not the case and you are just curious about the topic, you are also welcome to keep reading through. Please, also refer to the To get the most out of this book section that follows.