About this course
Students will learn fundamentals of reverse engineering of computer software (methods of executing and initializing programs, organization of executable files, work with third-party libraries). Special attention will be paid to C ++. Students will also become familiar with the principles of debugging tools, disassemblers and obfuscation methods. Finally, the course will focus on code compression and decompression and executable file reconstruction.
Learning outcomes
After he/she had completed the course, the student will be able to independently perform reverse analyses of binary executable files on the MS Windows platform, including analyzing obfuscated files (i.e. malware).
Course requirements
Very good knowledge of C, C++. Basic knowledge of programming in assembler/machine code.
Resources
- [1] Eilam, E.: Reversing: Secrets of Reverse Engineering. Wiley. 2005. 987-0-7645-7481-8.
- [2] Eagle, C.: The IDA Pro Book: The unofficial Guide to the World's Most Popular Disassembler. No Starch Press. 2011. 987-1-59327-289-0.
- [3] Seacord, R. C.: Secure Coding in C and C++. Software Engineering Institute, Carnegie Mellon University. 2013. 987-0-321-82213-0.
- [4] Russinovich M. - Solomon D. A. - Ionescu A.: Windows Internals Part 1. Microsoft Press. 2012. 987-0-7356-4873-9.
- [5] Russinovich M. - Solomon D. A. - Ionescu A.: Windows Internals Part 2. Microsoft Press. 2012. 987-0-7356-6587-3.
Activities
Reverse engineering, executable file analysis, malware, security, assembler, machine code.
Additional information
- Coordinating facultyCzech Technical University in Prague
- Contact a coordinator
- CreditsECTS 5
- Contact hours per week12
- InstructorsIng. Kokeš Josef Ph.D.
- Mode of instructionOnline - at a specific time
Offering(s)
Start date
23 September 2024
- Ends16 February 2025
- Term *Winter 2024/2025
- Instruction languageEnglish
- Register between15 May - 29 Jul 2024
Only 3 days to enrolApply now