IA-32, ARM assembler. Structure of memory in operating systems.
Structure of executable files. Structure of common ciphers implementation. Impact of common coding mistakes. Stack / heap overflow. Generic defense against stack / heap overflow (image base randomization, NX bit). Advanced attacks - return oriented programming. Rootkits. Digital signatures.
Introduction to instruction sets of common processors. Structure of basic binary formats.
Analysis of attacks that can be relatively easily described and reproduced upon the instruction level