top of page
Automated Reversing and Exploitation (5-day)

This is a majority hands-on course, with theory, visualizations: and lectures as needed. 

Exercises are in Linux and VxWorks, and utilize multiple architectures MIPS, PowerPC and ARM.  The course balances fundamentals with modern applications.


After completing this course, students will have the practical skills to assess embedded systems for vulnerabilities, recommend mitigations, and create proof-of-concept exploits through the use of both manual and automated techniques.

Boston Cybernetics Institute 2021©️

bottom of page