Show/hide contentOpenClose All
Curricular information is subject to change
● Learn key concepts and techniques of static reverse engineering
● x86 assembly programing
● Common code structures introduced by compilers
● Windows PE format
● Common approaches to reverse engineering using interactive disassembly and interactive
debugging
● Determining behavioural characteristics of a malware executable using dynamic analysis
● Practical skills with IDA Pro interactive disassembler, OllyDbg interactie debugger, Cuckoo Sandbox.
● Assembly programming (intel x86)
● Identifying high-level C language structures in compiled code
● Windows Portable Executable format
● IDA Pro disassembler, Cuckoo sandbox
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Laboratories | 24 |
Autonomous Student Learning | 77 |
Total | 125 |
Not applicable to this module.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Examination: Written exam. | 2 hour End of Trimester Exam | No | Alternative linear conversion grade scale 40% | No | 60 |
Assignment: Bi-weekly practical assignments. | Throughout the Trimester | n/a | Alternative linear conversion grade scale 40% | No | 40 |
Resit In | Terminal Exam |
---|---|
Autumn | Yes - 2 Hour |
• Feedback individually to students, post-assessment
• Online automated feedback
Assignment results will be notified after submission deadline. Where appropriate (e.g. when answering MCQ tests) the results will be communicated automatically online.