Workshop: The Roots of Cybersecurity- Introduction to Binary Exploitation


Details
**** Registration fee is non-refundable. Please fill up the scholarship (https://docs.google.com/forms/d/e/1FAIpQLSd6emT_IdEAmw8O4idNpMQOwIL9PISOHT502kkz-VO9rTH1EA/viewform?usp=sf_link) form if you need financial assistance by April 20th. ****
The Roots of Cybersecurity: A Brief Introduction to Binary Exploitation
This course peels back the layers of abstraction that normally separate you as a programmer from how your programs actually run on devices. We will go deep into detail about how computing devices work on the most fundamental levels and how knowing those details, we can leverage common errors programmers make to get their programs to do whatever we want. The workshop is mostly lecture with a detailed hands-on walkthrough of how to exploit a stack buffer overflow.
Pre-reqs:
Good understanding following Command Line commands in *nix environment: cd, ls, ssh, scp, nano/vi(or any other CLI based text editor)
Laptop configuration:
Mac OS X with Xcode installed.
About the instructor:
David Wang is a Senior Security Researcher with Azimuth Security and an expert on iOS security. As a member of the iOS jailbreak community, he has been the author of many iOS jailbreaks and baseband unlocks, and has spoken about his work many times at conferences like Black Hat and Hack in the Box. He is the recipient of a Pwnie Award for Best Privilege Escalation and is a Forbes 30 Under 30 honoree.
About Galois:
Galois is a privately held U.S.-owned and -operated company established in 1999 in Portland, Oregon. Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science. They are passionate about the trustworthiness of critical systems, and work to ensure that the systems you depend on work as intended, and only as intended.

Workshop: The Roots of Cybersecurity- Introduction to Binary Exploitation