Advanced Malware Analysis and Reverse Engineering

  • Cybersecurity |

Description

This course covers superior tactics for detecting the presence of vulnerabilities in binary software program and its evaluation of malicious software programs. It explores current studies and unsolved troubles in software program safety and forensics. This course aims to interact in crucial dialogue around critical software program protection and forensics (Binary Software Security, Binary Program Analysis Principles, Cyber Attack Response and Software Forensics). The course covers static and dynamic tools to develop a hybrid approach for effectively analyzing malware including assembly level debuggers, disassemblers, decompilers and sandboxes.

Program

Undergraduate 132 CRs

Objectives

  • - Understand different attack methods used by malicious actors and how they map to attack frameworks
    - Learn how malware authors dynamically construct import tables for function calls
    - Gain a deeper understanding of binary file formats and how to analyze them to learn more about malware behavior (Portable Executable- PE file format)
    - Leverage static and dynamic tools to develop a hybrid approach for effectively analyzing malware including assembly level debuggers, disassemblers, decompilers and sandboxes.
    - Learn how to interact in crucial dialogue around critical software program protection and forensics.

Textbook

Monnappa K A, Learning Malware Analysis: Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware, Packet Publisher

Course Content

content serial Description
1Course Aim, Course outline, understanding what is reverse engineering Malware and Malware Analysis
2Static Analysis
3Dynamic Analysis
4Assembly Language and Disassembly Primer
5Disassembly Using IDA
6Debugging Malicious Binaries
7Malware Functionalities and Persistence
87th week Assessment
9Reversing malware that uses Autolt ransomware
10Code Injection and Hooking
11Malware Obfuscation Techniques
1212th week Assessment
13Hunting Malware Using Memory Forensics
14Detecting Advanced Malware Using Memory Forensics
15Exploring posted studies papers related to malware behavior analysis.

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.