Date | Day | Time | Duration |
21 Aug | Monday | 0900-17:00 ICT/GMT+7 | 8 Hours |
22 Aug | Tuesday | 0900-17:00 ICT/GMT+7 | 8 Hours |
Go HERE to take this class as a 4-Day Buffet course.
Go HERE to take this class as a 3-Day Buffet course.
Go HERE to join just the x86-64 OS internals class.
Go HERE to join just the x86-64 Intel Firmware Attack & Defense class.
Because we give you all the lecture and lab materials and videos after class, what you’re really paying for is support from the instructor! So you’ll be entitled to keep asking up to 20 questions after class, with 1-2 hour turnaround answers (after accounting for time-zone differences.) This lets you keep productively working through the material if you run out of time at the conference. If you’d like to learn more about the benefits of this style of class delivery, please read this blog post
[1] https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.407.5071&rep=rep1&type=pdf
“Gamification: Nice Job. Unreal. Wow. Content selection: Perfect! Teaching style: I wish I had teachers like you for everything… no… EVERYTHING!!! Slides: Even if I live underground without computers for 10 years, come back, take your slides… I’ll remember everything“
“RARE Skills are valuable! The pep talk was amazing on why we should learn such stuff and skills. I liked how the material is really presented in depth. The quality is really amazing on the GDB content and everything needed and resources are placed nicely in the course.”
“I liked the mystery solving and gamification very much. Teaching assembly with gamification feels impossible yet it was done. It is well organized and the parting with sub-topics was good to follow and track where I am in the course.“
“I absolutely love the class, adding non technical story lines added a lot to me, kept it less “monotone” for me.“
“I liked the self paced nature of the course, which allowed me to track my progress and complete the course in a chunked manner.”
“The games at the end of each section really help in understanding concepts. The format of “here’s the idea, now a draw a stack diagram” is nice. There were times when I’d draw the stack diagram, get confused, then the next video answers my questions. The bomb lab is a fun way to test your knowledge.”
“I really liked the progress tracker. It gave me a sense of accomplishment when finishing modules. The GUI as a whole is well done. I felt like the progression of the class was logically laid out as well, adding more layers of complexity to the C code to provide more complex asm.”
“Elaborating concepts clearly. Nice presentation. Loved the “go and draw the stack diagram” part and the fun quizzes&games. Loved the fun way of explaining everything and it does not make it boring at all.”
Introduction
Computer Registers
Your First Instruction
The Stack
Calling Functions
Local Variables
Function Parameter Passing
Control Flow
Boolean Logic
Bit Shifting
Multiply and Divide
CISC Delight: REPeatable Instructions
Choose Your Own Adventure!
Windows Binary Debugging
Looking at all those examples on Linux!
Learning to Fish: Read The F*n Intel Manual!
Learning to Fish: Writing Assembly
The Most Important Assembly Exercise You’ll Ever Do: Binary Bomb Lab
Conclusion
Xeno began leading Windows kernel-mode rootkit detection and defense research projects at MITRE in 2009, before moving into research on BIOS security in 2011. His team’s first public talks started appearing in 2013, which led to a flurry of presentations on BIOS-level vulnerabilities up through 2014. In 2015 he co-founded LegbaCore.
And after presenting a firmware worm that could spread between Macs via Apple’s EFI-based BIOS and Thunderbolt Ethernet adapters, he ended up working for Apple. There he worked on securing all the lesser-known firmwares on Macs and peripherals – everything from 3rd party GPUs to SecureBoot for monitors! He also worked on the x86-side of the T2 SecureBoot architecture, and his final project was leading the M1 SecureBoot architecture – being directly responsible for designing a system that could provide iOS-level security, while still allowing customer choice to trust arbitrary non-Apple code such as Linux bootloaders. He left Apple in Dec 2020 after the M1 Macs shipped, so he could work full time on OpenSecurityTraining2