Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Registration Information
Registration Discounts
Venue, Hotel, and Travel
Student and Grants
Co-located Workshops
Program
Workshop Program
Sponsorship
Participate
Instructions for Authors and Speakers
Call for Papers
About
Workshop Organizers
Questions
Services
Past Workshops
Home
Attend
Program
Sponsorship
Participate
About
help promote
connect with us
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
»
Reversing and Exploitation Exercises
Tweet
connect with us
Reversing and Exploitation Exercises
Presentations:
Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom
A Tool for Teaching Reverse Engineering
On the Design of Security Games: From Frustrating to Engaging Learning
connect with us