This course covers superior tactics for detecting the presence of vulnerabilities in binary software program and its evaluation of malicious software programs. It explores current studies and unsolved troubles in software program safety and forensics. This course aims to interact in crucial dialogue around critical software program protection and forensics (Binary Software Security, Binary Program Analysis Principles, Cyber Attack Response and Software Forensics). The course covers static and dynamic tools to develop a hybrid approach for effectively analyzing malware including assembly level debuggers, disassemblers, decompilers and sandboxes.
Undergraduate 132 CRs
Monnappa K A, Learning Malware Analysis: Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware, Packet Publisher
content serial | Description |
---|
1 | Course Aim, Course outline, understanding what is reverse engineering Malware and Malware Analysis |
2 | Static Analysis |
3 | Dynamic Analysis |
4 | Assembly Language and Disassembly Primer |
5 | Disassembly Using IDA |
6 | Debugging Malicious Binaries |
7 | Malware Functionalities and Persistence |
8 | 7th week Assessment |
9 | Reversing malware that uses Autolt ransomware |
10 | Code Injection and Hooking |
11 | Malware Obfuscation Techniques |
12 | 12th week Assessment |
13 | Hunting Malware Using Memory Forensics |
14 | Detecting Advanced Malware Using Memory Forensics |
15 | Exploring posted studies papers related to malware behavior analysis. |
Start your application