- Rule-based test data generation
- Software and network vulnerabilities in computer systems
- Memory corruption vulnerabilities - stack, heap and globals overflow, ROP (JOP,COP), use after free etc
- Malware detection
- Compilers, post-link analyzers, parsing, code generation, code optimizations, sampling tools.
- Static and dynamic optimizations.
- Software engineering methods (OOA ,OOD, OOP)
- Operating Systems
- Computer (micro-)architecture
- Machine learning (classification, genetic algorithms)