Cyber Effects: Reverse Engineering, Exploit Analysis, and Capability Development


Cyber Effects: Reverse Engineering, Exploit Analysis, and Capability Development
 

Spring 2020

This new 500-level survey course will cover a broad range of topics related to cyber security and operations. This course will include real world studies of computer network operations and attack, with an emphasis on hands-on exercises and projects. The structure of the course will include weekly lectures, discussions, technical assignments, and a final capstone project. Topics will include computer architecture and assembly language, principles of embedded security, the essentials of exploit development and analysis (including using industry standard tools such as Ghidra, and utilizing computer security databases such as CVE), and discussion of real-world events and techniques.  Additional course details are available.

Instructors will be from a cohort of industry cyber effects subject matter experts from the MITRE Corporation.

Dr. Seth Landsman is a software and cyber engineer who has worked across multiple government agencies to support their unique national security missions. Seth has specific expertise in mobile environments, command and control systems, and system integration and holds a Ph.D. in computer science from Brandeis University.

Dan Walters is a Principal Embedded Security Engineer at The MITRE Corporation, where he has worked in the area of embedded systems since 2006. He helped develop MITRE's Secure Electronics Lab, which researches electronic implementation-security issues such as side-channel leakage, fault induction, and trusted hardware.

Dr. Ed Walters is a Principal Software Systems Engineer at the MITRE Corporation in the Tactical Edge Systems Group. He has a B.S. and an M.S. in Aero/Astro from MIT, an M.S. in Computer Science from Stevens Institute of Technology, and a Ph.D. in Computer Science from UMass Amherst. He has worked for various companies, including Volvo and Bell Labs, and worked on everything from internet infrastructure to compiler and simulator design for a research processor. At MITRE he has been involved with projects in the fields of Space Communication, Navigation, and Radar Systems. His research interests include computer system and hardware simulation, high-performance computing, and program analysis. On his off time, Ed enjoys cooking, hiking, and spending even more time in front of the computer gaming.

Nick Merlino is a cyber cellular research engineer who has worked at MITRE since 2015. Working for a variety of government agencies, his projects have included GPS systems, network security, secure distributed systems, and mobile security. He has a B.S. in Computer Science from the University of Massachusetts, Amherst, and is currently pursuing a M.S. in Cybersecurity from UMass.