Skip to content

History

Revisions

  • Added TIE: Principled Reverse Engineering of Types in Binary Programs.

    @HockeyInJune HockeyInJune committed Aug 20, 2014
    e56ad72
  • Added On the battlefield with the Dragons.

    @HockeyInJune HockeyInJune committed Jul 20, 2014
    f9da385
  • Added JPF.

    @HockeyInJune HockeyInJune committed Apr 30, 2014
    72d9e4a
  • Formatting.

    @HockeyInJune HockeyInJune committed Jan 29, 2014
    46a6d07
  • Added new materials for UMD CMSC 838G.

    @HockeyInJune HockeyInJune committed Jan 29, 2014
    e177988
  • Added S2E.

    @HockeyInJune HockeyInJune committed Jan 26, 2014
    d113b72
  • Added some more of Vanegue's stuff.

    @HockeyInJune HockeyInJune committed Jan 9, 2014
    946fc3d
  • Added Abstractions in Satisfiability Solvers.

    @HockeyInJune HockeyInJune committed Jan 1, 2014
    0a8f10d
  • Added Lessons In Static Binary Analysis Part 1: Binary Modeling.

    @HockeyInJune HockeyInJune committed Dec 26, 2013
    b75c14f
  • Added Checking the boundaries of static analysis.

    @HockeyInJune HockeyInJune committed Dec 3, 2013
    1df908e
  • Added The Automated Exploitation Grand Challenge.

    @HockeyInJune HockeyInJune committed Dec 3, 2013
    05c26fa
  • Added it-sec-catalog Exploitation

    @HockeyInJune HockeyInJune committed Oct 16, 2013
    d06c377
  • Added University of Maryland CMSC 838G

    @HockeyInJune HockeyInJune committed Oct 16, 2013
    f6dcaac
  • Updated Exploitation Mitigation Techniques (markdown)

    @HockeyInJune HockeyInJune committed Oct 14, 2013
    5c0ff2a
  • Added Exploit Mitigation Kill Chain.

    @HockeyInJune HockeyInJune committed Oct 6, 2013
    585e294
  • Added Coq and Quark.

    @HockeyInJune HockeyInJune committed Sep 11, 2013
    e27601b
  • Added Astrée, VCC, and Frama-C.

    @HockeyInJune HockeyInJune committed Aug 24, 2013
    f929508
  • Added Heap Feng Shui.

    @HockeyInJune HockeyInJune committed Aug 18, 2013
    380aeb9
  • Added Windows ISV Software Security Defenses.

    @HockeyInJune HockeyInJune committed Aug 17, 2013
    6e784ad
  • Replaced Wargames with Practice CTF List / Permanant CTF List and Competitions with calendars.

    @HockeyInJune HockeyInJune committed Aug 10, 2013
    ce2fe3e
  • Added The Many Maxims of Maximally Effective CTFs

    @HockeyInJune HockeyInJune committed Aug 10, 2013
    d5c76e8
  • Added picoCTF Preparations

    @HockeyInJune HockeyInJune committed Aug 10, 2013
    30b4080
  • Added Syracuse University's SEED: Developing Instructional Laboratories for Computer SEcurity EDucation

    @HockeyInJune HockeyInJune committed Aug 8, 2013
    bd33301
  • Added Academic Programs

    @HockeyInJune HockeyInJune committed Aug 8, 2013
    4880c21
  • Created Academic Programs

    @HockeyInJune HockeyInJune committed Aug 8, 2013
    3e7fe50
  • Added Methodologies For Hacking Embedded Security Appliances.

    @HockeyInJune HockeyInJune committed Aug 2, 2013
    6304f7f
  • Removed placeholder for Embedded Device Security.

    @HockeyInJune HockeyInJune committed Aug 2, 2013
    d2e399b
  • Just the beginnings of this wiki page.

    @HockeyInJune HockeyInJune committed Aug 2, 2013
    9db4536
  • Added Embedded Device Security (placeholder)

    @HockeyInJune HockeyInJune committed Aug 2, 2013
    2f542af
  • Created Embedded Device Security page.

    @HockeyInJune HockeyInJune committed Aug 2, 2013
    55e064d