We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Added TIE: Principled Reverse Engineering of Types in Binary Programs.
Added On the battlefield with the Dragons.
Added JPF.
Formatting.
Added new materials for UMD CMSC 838G.
Added S2E.
Added some more of Vanegue's stuff.
Added Abstractions in Satisfiability Solvers.
Added Lessons In Static Binary Analysis Part 1: Binary Modeling.
Added Checking the boundaries of static analysis.
Added The Automated Exploitation Grand Challenge.
Added it-sec-catalog Exploitation
Added University of Maryland CMSC 838G
Updated Exploitation Mitigation Techniques (markdown)
Added Exploit Mitigation Kill Chain.
Added Coq and Quark.
Added Astrée, VCC, and Frama-C.
Added Heap Feng Shui.
Added Windows ISV Software Security Defenses.
Replaced Wargames with Practice CTF List / Permanant CTF List and Competitions with calendars.
Added The Many Maxims of Maximally Effective CTFs
Added picoCTF Preparations
Added Syracuse University's SEED: Developing Instructional Laboratories for Computer SEcurity EDucation
Added Academic Programs
Created Academic Programs
Added Methodologies For Hacking Embedded Security Appliances.
Removed placeholder for Embedded Device Security.
Just the beginnings of this wiki page.
Added Embedded Device Security (placeholder)
Created Embedded Device Security page.