ARM Reverse Engineering, May 27-29 (20190527)

Open training → Embedded Systems → Software security → ARM Reverse Engineering


Location: Delft.

This training will equip you with the necessary knowledge to perform reverse engineering of ARM binary code to understand its functionality. You will have experience with state-of-the-art tooling to perform such analysis, and understand how high-level code translates into binary. Riscure will provide laptops with the required software, including Riscure’s licenses for IDA Starter.

Reverse Engineer ARM binary code by using static and dynamicanalysis techniques.

  • Identify high level language constructs in binary code (e.g. structures, loops, functions, classes, etc.)
  • Identify common data structures in binary code (e.g. arrays, linked-lists, trees, etc.)
  • Identify of typical vulnerability patterns in binary code

    Date: 2019/05/27 Days: 3 Location: Delft


Empty course

There are no units at the moment
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: 2 years