If you have an iPad or other tablet, drop this PDF on it and read it whenever you have spare time. It's large, but the best PDF to get is the combined set, downloadable via the first link on that page.
These are free and available via this link: You may also need a copy of the Intel Developer’s manuals. Computer Systems: A Programmer's Perspective. ISBN: 978-1593272890īackground On Low-Level Computer Systems Programming:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. Practical Tools/Techniques For Malware Reverse Engineering: Read these books only if you want to learn more! They will not be covered in lectures or on exams! The following books are recommended for additional background or more in-depth understanding of the topics discussed in class. The course will be driven by a sequence of hands-on reverse engineering exercises whichĮmphasize the discovery, understanding, and mitigation of common malware tactics - the devil really is in the details. There is no required textbook for this course. Piazza (Discussion, Questions, Announcements): Materials 1:30 pm to 3:00 pm in Van Leer 449 cubicle B, or by appointmentĬanvas (Lecture Slides, Assignments, Grades): 1:15 pm to 2:15 pm in Klaus 2314, or by appointmentĮmail: hours: Mon. Instructor: Professor Brendan SaltaformaggioĮmail: hours: Tues. Patches function as promised, and for the simple joy of understanding how software executes at a deep level.Ĭlass day/time: Tues. Practicing software reverse engineering is also useful for creating interoperable software, for verifying that software and software Why take this course?: You are interested in learning the fundamental principles of dissecting malware and cyber attack triage. This course exposes students to an immersive, hands-on experience in malware analysis andĮxamines a wide range of software security topics relating to operating systems, The goal of this course is to provide a solidįoundation in reverse engineering, which is crucial in understanding modern malware andĬrafting solutions for the remediation and prevention of cyber attacks. Malware reverse engineering involves deep analysis of the code, structure, andįunctionality of malicious software.