Vulnerability Research and Exploitation on Edge Devices: Memory Corruption Edition
Participants will research and exploit vulnerabilities on a real-world embedded edge device in Fortune 500 environments, advancing from restrictive shells to fuzzing, crash triage, root-cause analysis, and weaponizing memory-corruption bugs for remote code execution.

