課程信息
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
完成時間(小時)

完成時間大約為17 小時

建議:8 hours/week...
可選語言

英語(English)

字幕:英語(English)
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
完成時間(小時)

完成時間大約為17 小時

建議:8 hours/week...
可選語言

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 3 小時

Introduction

After reporting on the insights of a real-world research about a botnet takeover, students will learn about malicious software, with a particular glimpse at botnets and their detection to finally conlude brielfy with rootkits.<BR><BR><B>Lecture outline</B><BR>1. Should we care? A botnet takeover storytelling<BR>2. Admin blabbing<BR>3. Malicious software <BR>4. (a glimpse at)Botnets<BR>5. (a glimpse at) Botnets detection & Rootkits...
Reading
12 個視頻 (總計 115 分鐘), 1 個閱讀材料, 1 個測驗
Video12 個視頻
Should we care? A botnet takeover storytelling11分鐘
Admin blabbing 11分鐘
Malicious Software (part 1) 10分鐘
Malicious Software (part 2) 9分鐘
(a glimpse at) Botnets (part 1) 10分鐘
(a glimpse at) Botnets (part 2) 6分鐘
(a glimpse at) Botnets (part 3) 10分鐘
(a glimpse at) Botnets detection and Rootkits (part 1)8分鐘
(a glimpse at) Botnets detection and Rootkits (part 2)9分鐘
(a glimpse at) Botnets detection and Rootkits (part 3)11分鐘
(a glimpse at) Botnets detection and Rootkits (part 4)13分鐘
Reading1 個閱讀材料
Module One Reading10分鐘
Quiz1 個練習
Week 1 — Quiz50分鐘
2
完成時間(小時)
完成時間為 3 小時

Static analysis and its limitations

Students will look at the malware landscape of the early days and what effort and challenges the AV industry was facing to fight malware threats. The lecture covers static analysis as a first technique to analyze and detect malware; (basic) assembly and reverse engineering notions are provided with a look at basic techniques to fool the state-of-the-art disassembly algorithm, quickly highlighting the limits of static analysis, especially when focused on analyzing malware. A walk-through to reverse engineer an example program concludes the lecture.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Early days, AV industry<BR>2. (a glimpse at) Reverse engineering (part 1)<BR>3. (a glimpse at) Reverse engineering (part 2)<BR>4. (a glimpse at) Polymorphism, code obfuscation<BR>5. IDA Pro—a very simple example. . ....
Reading
8 個視頻 (總計 99 分鐘), 1 個閱讀材料, 1 個測驗
Video8 個視頻
(a glimpse at) Reverse engineering (part 1.1) 11分鐘
(a glimpse at) Reverse engineering (part 1.2) 11分鐘
(a glimpse at) Reverse engineering (part 1.3) 8分鐘
(a glimpse at) Reverse engineering (part 2) 9分鐘
(a glimpse at) Polymorphism, code obfuscation 18分鐘
IDA Pro—a very simple example. . . (part 1) 10分鐘
IDA Pro—a very simple example. . . (part 2) 13分鐘
Reading1 個閱讀材料
Module Two Reading10分鐘
Quiz1 個練習
Week 2 — Quiz4分鐘
3
完成時間(小時)
完成時間為 3 小時

Dynamic analysis and its limitations

While looking at how the malware landscape has been evolving, students will be given an introduction at dynamic analysis, a complementary technique to static analysis to fight malware threats. Packing and algorithmic-agnostic unpacking is introduced as an initial step toward full dynamic analysis. The lecture quickly mentions sandboxes and limits of dynamic analysis and sandboxes, to finally conclude with a brief overview of a particular academic research state-of-the-art for malware protection.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Toward dynamic analysis<BR>2. (a glimpse at) Dynamic analysis (part 1)<BR>3. (a glimpse at) Dynamic analysis (part 2)<BR>4. (a glimpse at) Limits of dynamic analysisM<BR>5. AccessMiner—system-centric models...
Reading
7 個視頻 (總計 87 分鐘), 1 個閱讀材料, 1 個測驗
Video7 個視頻
(a glimpse at) Dynamic analysis (part 1.1) 11分鐘
(a glimpse at) Dynamic analysis (part 1.2) 14分鐘
(a glimpse at) Dynamic analysis (part 2.1) 10分鐘
(a glimpse at) Dynamic analysis (part 2.2) 9分鐘
(a glimpse at) Limits of dynamic analysis 11分鐘
AccessMiner — system-centric models 15分鐘
Reading1 個閱讀材料
Module Three Reading10分鐘
Quiz1 個練習
Week 3 — Dynamic analysis and its limitations2分鐘
4
完成時間(小時)
完成時間為 2 小時

Mobile malware

The lecture introduces the students to mobile malware threats; in particular, the lecture focuses on Android malware, providing a quick overview of Android applications and describing a <A href= "http://copperdroid.isg.rhul.ac.uk/">virtual machine-based dynamic analysis research</a> carried out in the <a href= "http://www.isg.rhul.ac.uk/">ISG</a> at <a href= "http://www.rhul.ac.uk/">Royal Holloway University of London</a> in collaboration with the <a href= "http://security.di.unimi.it/">LaSER</a> at <a href= "http://www.unimi.it/"> University of Milan</a>.<BR><BR><B>Lecture outline</B><BR><BR>1. Introduction<BR>2. Background<BR>3. CopperDroid: dynamic analysis of Android malware (part 1)<BR>4. CopperDroid: dynamic analysis of Android malware (part 2)...
Reading
4 個視頻 (總計 49 分鐘), 1 個閱讀材料, 1 個測驗
Video4 個視頻
Background 12分鐘
Dynamic analysis of Android malware (part 1) 15分鐘
Dynamic analysis of Android malware (part 2) 10分鐘
Reading1 個閱讀材料
Module Four Reading10分鐘
Quiz1 個練習
Week 4 — Mobile malware52分鐘

講師

Avatar

Dr Lorenzo Cavallaro

Reader (Associate Professor)
Information Security Group, Royal Holloway, University of London

關於 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您购买证书后,将有权访问所有课程材料,包括评分作业。完成课程后,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心