Assembly

 

 


 

Customize your search:

E.g., 2016-12-07
E.g., 2016-12-07
E.g., 2016-12-07
Self Paced Course - Start anytime

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

No votes yet
Self Paced Course - Start anytime

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

Average: 1 (1 vote)
Self Paced Course - Start anytime

A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.

No votes yet
Self Paced Course - Start anytime

Intel processors have been a major force in personal computing for more than 30 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation.

Average: 10 (1 vote)
Self Paced Course - Start anytime

This class provides an introduction to the ARM architecture and assembly language.

Average: 4.7 (3 votes)
Self Paced Course - Start anytime

A survey of basic stack and heap-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code.

No votes yet