Published using Google Docs
CS 492/592 Malware Reverse Engineering
Updated automatically every 5 minutes

CS 492/592 Malware Reverse Engineering

Credit Hours:

4/3

Course Coordinator:

Wu-chang Feng

Course Description:

Studies the techniques malicious code developers employ to exploit vulnerable computer systems. The course explores the form and function of a range of malware while exploring how the increased mixing of code and data is now exposing us to an array of security vulnerabilities and exploits. Given these threats, the course will then examine modern defenses against malware and how they can be used to protect users.

Prerequisites:

Junior-standing and admission to the CS program.

Goals:

Upon the successful completion of this class, students will be able to:

 

  1. Describe the underlying mechanisms used by viruses, worms, trojans, backdoors, and rootkits.
  2. Describe vulnerabilities that malware exploits to compromise end hosts.
  3. Describe techniques malware uses to circumvent and evade detection
  4. Describe counter-measures that prevent the spread of malware
  5. Describe counter-measures that detect malware

Textbooks:

  1. Practical Malware Analysis, Michael Sikorski and Andrew Honig, 2013

Major Topics:

Oral and Written Communications:

Students will present research papers that describe the state of the art in the subject area.

Social and Ethical Issues:

Students will study the ethics related to working with malware and software vulnerabilities.

Problem Analysis:

Throughout the term, students will be analyzing problems related to the detection and mitigation of malware threats.

Solution Design:

A final project may be given for students in designing malware-resistant systems.