Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
tptacek
5 days ago
|
parent
|
context
|
favorite
| on:
Computer Systems Security 6.566 / Spring 2024
Of course! It's a survey course. But you could probably get somewhere significant in a rigorous 3-month course on memory corruption.
chc4
5 days ago
[–]
RPISEC's Modern Binary Exploitation is somewhat famous for doing exactly that!
reply
tptacek
5 days ago
|
parent
[–]
More people interested in security should know about RPI. :)
reply
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: