Vulnerability Discovery and Exploitation
This is a majority hands-on course, with theory, visualizations: and lectures as needed. Exercises are in Linux and VxWorks and utilize multiple architectures with an emphasis on PowerPC. The course balances fundamentals with modern applications.
After completing this course, students will have the practical skills required to assess embedded programs for vulnerabilities, recommend mitigations, and create proof-of-concept exploits to demonstrate those vulnerabilities to commanders.