Software Reverse Engineering and Malware Analysis

Course #CS4648

Start Starts: not available

Clock Est. completion in 3 months

Location pin Offered through Distance Learning

Avg. tuition cost per course: See tuition Info For specific tuition costs of each program or contact information, please contact the NPS Tuition office at tuition@nps.edu .

Learn more about Service Obligation Info Officers accepting orders to a Graduate Education Program (GEP) are obligated to serve on active duty after completion.

Questions? Reach out directly:

NPS Online Student Support

online@nps.edu

Email
Offerings database access

Overview

This course will explore how malware is constructed through reverse engineering and analysis of malicious code. Techniques to perform dynamic behavioral analysis and static examination of program control flow and properties will be discussed. Malware analysis topics include: obfuscation, stealth, persistence, propagation, network communications for command & control, anti-analysis (anti-debugging, anti-disassembly, anti-virtualization), code injection, and process hollowing. Reverse engineering involves disassembling and analyzing binary executables to determine the techniques used by the malware to achieve its mission. Attack campaigns by known advanced persistent threats. (APTs) will be used in case studies.

Included in Degrees & Certificates

  • 367

Prerequisites

  • CS3140
  • CS3070
  • Or consent of instructor

Learning Outcomes

The student will be able to:

  • Describe obfuscation techniques.
  • Describe stealth and persistence mechanisms.
  • Describe anti-analysis (anti-debugging, anti-disassembly, anti-virtualization) techniques.
  • Describe code injection and process hollowing techniques.
  • Describe process to reverse engineer binary executables.
  • Describe process to perform static analysis.
  • Describe process to perform dynamic analysis.
  • Describe communications channels.
  • Understand APTs, propagation vectors, and attribution.