Automated Reversing and Exploitation
This is a majority hands-on course, with theory, visualizations: and lectures as needed. Exercises are in Linux and VxWorks, and utilize multiple architectures MIPS, PowerPC and ARM. The course balances fundamentals with modern applications.
After completing this course, students will have the practical skills to assess embedded systems for vulnerabilities, recommend mitigations, and create proof-of-concept exploits using both manual and automated techniques.