Warning! The directory is not yet complete and will be amended until the beginning of the term.
052012 VU Software Security (2024W)
Continuous assessment of course work
Labels
Registration/Deregistration
Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).
- Registration is open from Fr 13.09.2024 09:00 to Fr 20.09.2024 09:00
- Deregistration possible until Mo 14.10.2024 23:59
Details
max. 25 participants
Language: English
Lecturers
Classes (iCal) - next class is marked with N
- Monday 21.10. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 11.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 02.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 16.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 13.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 27.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
Information
Aims, contents and method of the course
Students learn which methods exist for protecting software against reverse engineering and how adversaries analyze binary programs. For this purpose, algorithms for code obfuscation (protection against program analysis), software fingerprinting (protection against unauthorized distribution), and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of static and dynamic program analysis and know which techniques are used to perform reverse engineering attacks on programs.
Assessment and permitted materials
Students have to solve a number of practical assignments worth a varying number of points (in total: 100 points) on their own. Group work is not allowed.
Minimum requirements and assessment criteria
Knowledge on how software can be protected against reverse engineering; basic binary reverse engineering knowledgeGrading:
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
Examination topics
Assignments on the following topics:
- Deobfuscating Source Code
- Deobfuscating and Decompiling Binary Code
- Tampering with Binary Code
- Extracting a Secret Asset from a Binary
- Analyzing Malware
- Protecting Software
- Performing Collusive Attacks on Binary Fingerprinting
- Deobfuscating Source Code
- Deobfuscating and Decompiling Binary Code
- Tampering with Binary Code
- Extracting a Secret Asset from a Binary
- Analyzing Malware
- Protecting Software
- Performing Collusive Attacks on Binary Fingerprinting
Reading list
Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.
Association in the course directory
Last modified: We 11.09.2024 11:25