This course describes the reverse engineering principles and techniques of binary files, including static analysis, decomposition algorithms, dynamic analysis, and automated techniques for static and dynamic analysis. In addition, this course utilizes tools such as interactive disassembler (IDA) to demonstrate anti-analysis techniques, malware obfuscation, and packaging techniques.
Undergraduate 132 CRs
Abhijit Mohanta and Anoop Saldanha, Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware, Apress
content serial | Description |
---|---|
1 | Course Aim, Course outline, malware identification and Malware types and behaviors |
2 | Malware Components and Analysis, and Reverse Engineering and assembly |
3 | Malware Analysis and Classification including Different techniques of binary files, including static analysis and decomposition analysis |
4 | Automated techniques for dynamic and static analysis |
5 | Ethical considerations, Senior Managers How to Write a Good Report |
6 | Conducting a reverse engineering analysis |
7 | 7 th week Assessment |
8 | Obfuscation schemes |
9 | Analyzing hostile malware |
10 | How to build signatures to stop malware |
11 | 12th week Assessment |
12 | How to use artificial intelligence and machine learning in malware analysis |
13 | Reverse engineering tools which demonstrate anti-analysis techniques |
14 | Malware obfuscation, and packaging techniques |
15 | Revision |
Start your application