ARM Reverse Engineering Training

After releasing your binary firmware or application, attackers can still retrieve information you believed safe. The process of extracting information from binary files is known as reverse engineering and is a fundamental embedded system security technique. We use a hands-on approach that gives you a solid understanding of the techniques to navigate, instrument and analyze binary code.

Duration: 3 days | Type: Classroom/Hands-on exercises | Special discount for the owners of IDA Pro license

Upcoming course: May 27-29, learn more and sign up

Who is this training for?

The course is aimed at security analysts who want to understand the basics of reverse engineering to discover vulnerabilities in a black-box scenario. Reverse engineering is a skill useful for application developers, who want to understand what vulnerabilities are introduced during compilation.

Pre-requisites for following this training:

  • The ability to understand source code in C/C++
  • Basic understanding of assembly languages, preferably the ARM v7 architecture
  • Basic understanding of computing systems, memory organization
  • Ability to understand Python is desirable: it will be used to illustrate how to script IDA and how to emulate code using the Unicorn Engine

Learning Objectives

Have you always wondered how to take a piece of software apart and understand its inner workings? Have you wondered how to extract useful information from a binary file?

The Reverse Engineering training for software applications aims to do just that. During this training you understand the functionality of compiled code by combining static and dynamic analysis techniques. During the training we focus on the ARM platform. We use exercises throughout the course to teach the skill of reversing.

This training will equip you with the necessary knowledge to perform reverse engineering of ARM binary code to understand its functionality. You will have experience with state-of-the-art tooling to perform such analysis, and understand how high-level
code translates into binary. Riscure will provide laptops with the required software, including Riscure’s licenses for IDA Starter.

Reverse Engineer ARM binary code by using static and dynamic analysis techniques.

  • Identify high level language constructs in binary code (e.g. structures, loops, functions, classes, etc.)
  • Identify common data structures in binary code (e.g. arrays, linked-lists, trees, etc.)
  • Identify typical vulnerability patterns in binary code

Interested? View the upcoming courses or get in touch with us

Please click here to access our e-learning platform where you will be able to view the upcoming dates for this training. Once you have your plans defined, there you can also register and purchase your seat right away. If you have questions or would like to discuss a special training program for your company, please contact us at

By continuing to browse this website, you agree to the use of cookies and data processing according to our privacy statement. Close