Course - Reverse Engineering and Malware Analysis - IMT4116
Reverse Engineering and Malware Analysis
Choose study yearAbout
About the course
Course content
-Malware methodology
-Basic analysis
-Advanced static analysis
-Advanced Dynamic analysis
-Anonymous and stealthy analysis
-Malware classification and functionality
-Anti Reverse-engineering
-Malware lab
Learning outcome
Knowledge:
-The candidate possess knowledge of methodology, technology and application of malware analysis and reverse engineering
-The candidate possess thorough knowledge of anonymous analysis
-The candidate possess advanced knowledge of static malware analysis
-The candidate possess advanced knowledge of dynamic malware analysis
-The candidate possess thorough knowledge of malware classification and functionality
-The candidate possess knowledge of anti-reverse engineering techniques
-The candidate possess thorough knowledge of building and using a malware lab
Skills:
-The candidate is capable of applying malware analysis methodology and technology
-The candidate is capable of applying advanced static malware analysis
-The candidate is capable of applying advanced dynamic malware analysis
-The candidate is able to identify basic and some advanced malware functionality
-The candidate is able to identify known anti-reverse engineering techniques
-The candidate is able to conduct an analysis without revealing that the investigation is taking place and/or revealing their identity.
General competence:
-The candidate is capable of analyzing relevant professional and research problems in malware analysis
-The candidate is capable of applying their knowledge and skills in new fields, in order to accomplish advanced task and projects in malware analysis
-The candidate is capable of working independently as a malware analyst and is familiar with terminology.
-The candidate is capable of discussing professional problems, analysis and conclusions in the field of malware analysis, both with professionals and with general audience
-The candidate has the learning skills to continue acquiring new knowledge and skills in a largely self-directed manner
-The candidate is capable of contributing to innovation and innovation processes
Learning methods and activities
-Lectures
-Lab work
-E-learning
-Compulsory assignments
Additional information:
-The course will be made accessible for both campus (Gjøvik) and remote students. Students are free to choose the pedagogic arrangement that is best fitted for their own requirement. The lectures in the course will be given on campus Gjøvik and are recorded.
Compulsory requirements:
-Two exercises must be approved in order to take the exam.
Compulsory assignments
- Coursework Requirements
Further on evaluation
Re-sit only possible the next time the course is running.
Form of assessment: 72 hour home exam.
In specific circumstances, the course responsible can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative description of the A-F scale.
Specific conditions
Admission to a programme of study is required:
Digital Infrastructure and Cyber Security (BDIGSEC)
Information Security (MIS)
Information Security (MISD)
Information Security (MISEB)
Required previous knowledge
Laboratory activities will involve analyzing and handling malicious code on your computer system. Virtual machines and due caution will be used, but it is nevertheless not recommended to use your organizations laptop in laboratory activity.
Course materials
Books/standards, conference/journal papers and web resources, such as
-M.Sikorski and A. Honig: Practical Malware Analysis, The hands on guide to dissecting Malicious Software
-M. Ligh, S Adair, B Hartstein and M.Richard: Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code.
Subject areas
- Information Security
Contact information
Course coordinator
Lecturers
Department with academic responsibility
Department of Information Security and Communication Technology