AUGUSTA, Ga. – AvengerCon VIII, Army Cyber’s homegrown hacker convention returned for its eighth iteration, and its first at the Georgia Cyber Innovation & Training Center, February 28 and 29, and day one consisted of training workshops. Intro to Symbolic Execution By Jeremy Blackthorne, Boston Cybernetics Institute This is an 80% hands-on course with many demos, examples, exercises, and solutions. Exercises will be mostly x64 and ARM binaries for Linux, but we will also apply it to other architectures, such as MIPS and PowerPC. Although the theory behind symbolic execution is fascinating, w


AUGUSTA, Ga. – AvengerCon VIII, Army Cyber’s homegrown hacker convention returned for its eighth iteration, and its first at the Georgia Cyber Innovation & Training Center, February 28 and 29, and day one consisted of training workshops. Intro to Symbolic Execution By Jeremy Blackthorne, Boston Cybernetics Institute This is an 80% hands-on course with many demos, examples, exercises, and solutions. Exercises will be mostly x64 and ARM binaries for Linux, but we will also apply it to other architectures, such as MIPS and PowerPC. Although the theory behind symbolic execution is fascinating, we will minimally cover it and instead focus on the practical applications of symbolic execution. Students are provided a preconfigured VM with all necessary tools and exercises. The instructor’s computer screen and voice will also be recorded during the day and provided for reference. Students can then review the recordings during the course and retain them for use afterwards.


Size: 6720px × 4480px
Photo credit: © Operation 2024 / Alamy / Afripics
License: Licensed
Model Released: No

Keywords: army, avengercon, cyber, cybersecurity, hackers