Universität Wien
Warning! The directory is not yet complete and will be amended until the beginning of the term.

052012 VU Software Security (2024W)

Continuous assessment of course work

Registration/Deregistration

Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).

Details

max. 25 participants
Language: English

Lecturers

Classes (iCal) - next class is marked with N

  • Monday 21.10. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
  • Monday 11.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
  • Monday 02.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
  • Monday 16.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
  • Monday 13.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
  • Monday 27.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02

Information

Aims, contents and method of the course

Students learn which methods exist for protecting software against reverse engineering and how adversaries analyze binary programs. For this purpose, algorithms for code obfuscation (protection against program analysis), software fingerprinting (protection against unauthorized distribution), and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of static and dynamic program analysis and know which techniques are used to perform reverse engineering attacks on programs.

Assessment and permitted materials

Students have to solve a number of practical assignments worth a varying number of points (in total: 100 points) on their own. Group work is not allowed.

Minimum requirements and assessment criteria

Knowledge on how software can be protected against reverse engineering; basic binary reverse engineering knowledge

Grading:
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))

Examination topics

Assignments on the following topics:
- Deobfuscating Source Code
- Deobfuscating and Decompiling Binary Code
- Tampering with Binary Code
- Extracting a Secret Asset from a Binary
- Analyzing Malware
- Protecting Software
- Performing Collusive Attacks on Binary Fingerprinting

Reading list

Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.

Association in the course directory

Last modified: We 11.09.2024 11:25