Windows, Linux, and Mac all run in x86 assembly. From your favorite software application down to their system kernels. Ever wondered what happens under the hood when programs execute? What does printf(‰ÛÏHello World!‰Û); actually do? Whether your focused on improving the efficiency of your applications, securing your applications against known exploitation techniques, reverse engineering software or going on the offensive with exploitation development a firm grasp on assembly is essential. Come get an hour introduction to the world of x86 Assembly
Stephanie Preston, CEH, GSEC, EIT (B.S., Electrical and Computer Engineering) Ms. Preston is on Battelle‰Ûªs Cyber Innovations team, where she focuses on firmware reverse engineering (x86, MIPS, 8051), as well as application development (C/C++). She also serves as the team‰Ûªs intellectual property steward. Ms. Preston is the founder and current chair for Battelle's Vulnerability Disclosure Committee. Ms. Preston is a registered engineer in training (EIT) in the state of Ohio, holds a (GSEC) Global Information Assurance Certification (GIAC) Security Essentials certification, and a Certified Ethical Hacker (CEH) certification. She also serves as an adjunct faculty member at the Ohio State University College of Computer Engineering where she teaches C and x86 assembly.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek