0% found this document useful (0 votes)
150 views2 pages

Reverse Engineering Syllabus

The document discusses several topics related to digital forensics and reverse engineering including: 1. Performing memory analysis and data carving using tools like EnCase. 2. Extracting files from Windows like the MFT and registry hives. 3. Recovering and analyzing data from storage media. 4. Several textbooks and reference books are listed that cover topics like file system forensics, digital evidence investigation, and CD/DVD forensics.

Uploaded by

Ruma Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views2 pages

Reverse Engineering Syllabus

The document discusses several topics related to digital forensics and reverse engineering including: 1. Performing memory analysis and data carving using tools like EnCase. 2. Extracting files from Windows like the MFT and registry hives. 3. Recovering and analyzing data from storage media. 4. Several textbooks and reference books are listed that cover topics like file system forensics, digital evidence investigation, and CD/DVD forensics.

Uploaded by

Ruma Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Tools With and Without Write Blockers.

3. Perform Imaging and Analysis of Volatile Memory using EnCase/Other Open Source Tools
4. MFT & Registry Hives Extraction from Windows OS through Tools and Scripts.
5. Data Carving Using Open Source Tools
6. Data Recovery and Secure deletion on Storage media.
7. Hiding Data into Slack Space.
8. Information gathering and network traffic analysis using TCP DUMP and WIN DUMP
9. Attacks and Forensics using IoT devices
10. Explore the Phases of Ethical Hacking in terms of implementing some attack.
11. Solving Case Study using online datasets from digitalcorpora.org

Text Books:
1. Kanellis, Panagiotis, “Digital Crime and Forensic Science in Cyberspace”, IGI Publishing,
ISBN 1591408733.
2. Brain Carrier, “File System Forensics Analysis”, Addison-Wesley Professional, 1 st Edition,
2005
3. Marshell, Angus M. (2008), “Digital Forensics: Digital Evidence in Criminal Investigation”,
Wiley Blackwell, ISBN 0470517751.
Reference Books:
1. Paul Crowley Dave Kleiman, “CD and DVD Forensics”, Syngress Publishing Inc, 2007
2. Chris Prosise, Kevin Mandia “ INCIDENT RESPONSE & COMPUTER FORENSICS”,
McGraw-Hill, 2nd Edition, 2003.
3. Rick Ayers, WayneJansenetal.,"Cell Phone Forensic Tools: An Overview andAnalysis",
NISTIR 7250,2010.
4. Paul CrowleyDaveKleiman, “CD and DVD Forensics”,SyngressPublishing Inc,2007.

Elective-I/II

CE669 Reverse Engineering and Malware Analysis

Course Objectives:The course introduces reverse engineering techniques and explores the
techniques for detecting, analyzing, reverse engineering and eradicating malware.
Upon completion of the course, students should be able to:
Have a good understanding of reverse engineering techniques and tools
Identify the different types of malware analysis methods
Setup an environment for malware analysis
Recognize common malware characteristics
Prerequisites: Assembly language programming, OS fundamentals.

Syllabus:
Introduction to reverse engineering, Low level software, Assembly language primer, Compilers,
Execution Environments, Windows OS fundamentals, Executable file formats, Static & Dynamic
reverse engineering, Reversing tools, Disassemblers, Debuggers, Decompilers, System
monitoring tools, Reversing program binaries, Anti-reversing techniques, Breaking protections,
Reversing ‘.NET’, De-compilation, Introduction to malware, Software vulnerabilities – buffer
overflow, integer overflow, vulnerabilities exploitation, mitigation; Return oriented

159
programming; Reversing malware – Static & Dynamic malware analysis techniques, Packers &
compression, Sandboxing executables& runtime analysis; Malware classification.
Text Book:
1. EldadEilam, “Reversing: Secrets of Reverse Engineering”, Wiley publishing, 2005.
Reference Books:
1. Michael Ligh, Steven Adair, “Malware Analysts’s cookbook & DVD”, Wiley publishing
2. Michael Sikorski and Andrew Honig, Practical Malware Analysis, No Starch Press, 2012.
3. Erik Buchanan, Ryan Roemer, HovavShacham, and Stefan Savage. 2008. “When good
instructions go bad: generalizing return-oriented programming to RISC.”

CE 681 Mobile Computing

Course Objectives: Course provides introduction to the fundamentals of mobile computing,


mobile application development as well as wireless communication and security. Students will
gain a sound understanding of the core concepts of mobile networks and the design of cellular
networks including approaches to maximize the available capacity. The course will look at some
current research in mobile computing security and wireless security. Students will learn android
application development framework and use it to implement their assignments.
Course Prerequisites: Students are required to gain knowledge of basics of computer
networking.

Syllabus:
Principle of Cellular Communication, Overview 1G, 2G, 3G, 4G, LTE, 5G technologies.
Wireless Transmission: Frequencies for radio transmission, Signals, Antennas, Signal
Propagation, Multiplexing. Modulation, Spread spectrum, Cellular systems. Medium Access
Control: Motivation for a specialized MAC, SDMA, FDMA, TDMA, CDMA, Comparison.
GSM: Cellular Systems, Mobile Services, System Architecture, Radio Interface, Protocols,
Localization and calling, Handover, Security. Data services: GPRS, HSCSD Mobility
management: Handoff, Roaming Management, Handoff Detection Strategies, Channel
Assignment, Radio Link transfer, GSM Location Update, Mobility Databases, Failure
Restoration, VLR Overflow Control. Satellite Systems: GEO, LEO, MEO, Routing,
Localization, Handover. Wireless LAN: Infrared and radio transmission, Infrastructure and Ad-
hoc network, IEEE 802.11, Bluetooth. Mobile Device Platforms: Mobile OS, Palm Os, Win CE
and Symbian. Mobile Network Layer: Mobile IP, Mobile Ad-hoc Networks, Cellular Digital
Packet Data (CDPD), Wireless Local Loop (WLL) systems. Mobile Transport Layer: Traditional
TCP, Classical TCP Improvements, Mobile-TCP. Wireless Application Protocol (WAP): WAP
Architecture, Wireless Markup Language (WML), WML-Script, WAP 2.0. Wireless Network
Security: IEEE 802.11 Wireless LAN Attacks, Different Attack Tools, Different Types of
Security Mechanisms, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi
Protected Access –II (WPA-2), Deploying Secure Wireless networks, Security in Bluetooth,
Security in Adhoc Networks. Case Study: Android Application Development, Android Security.

Text/Reference Books:
1. Jochen Schiller, "Mobile Communication", 2nd Edition, Pearson Education.
2. Yi Bing Lin and ImrichChlamtac, "Wireless and Mobile Networks Architecture", John
Wiley & sons, 2001.
3. Ed Burnette, "Hello Android", Pragmatic Bookshelf; Third Edition edition, 2010.
4. Yan Zhang, Jun Zheng, Miao Ma, “Handbook of Research on Wireless Security”,
Volume 1, Idea Group Inc (IGI), 01-Jan-2008.

160

You might also like