-
scalable and efficient software and firmware analysis methodologies using tools like Frida or IDA Pro, enhanced with traffic monitoring techniques and Machine Learning to detect and analyze vulnerabilities
-
analysis, modeling and applied ML experience is recommended, given the need to identify patterns in large-scale behavioral logs. Software reverse engineering (Frida, IDA Pro) experience is recommended
Searches related to software verification
Enter an email to receive alerts for software-verification positions