Maria Markstedter is the CEO and founder of Azeria Labs, established in 2017 to provide advanced training to companies on binary exploitation, as well as identifying and defending security vulnerabilities on Arm devices. Azeria Labs also provides free public workshops that teach developers and security engineers about the security of Arm-based technologies.
In 2018, Maria was listed in Forbes 30 Under 30 and joined the review board of the Black Hat security conference.
Maria's research interests are in processor and OS security, defensive mitigations against binary exploits, and reverse engineering.
About the training
Packed with practical labs and hands-on examples, our AMR Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.
Our reverse engineering courses are based around a series of reverse engineering labs, ranging from pure reverse engineering of compiled binaries to offensive security-focused vulnerability discovery and vulnerability class hunting.
• Disassemble and debug real-world applications
• Perform vulnerability discovery and learn about different vulnerability classes
• Understand control flow of real-world applications
• Learn to use disassembly tools like Ghidra, radare2, Frida, and GDB
Duration: 4 days
Prerequisites: RE concepts