Reverse Engineering Syllabus
Reverse Engineering Syllabus
3. Perform Imaging and Analysis of Volatile Memory using EnCase/Other Open Source Tools
4. MFT & Registry Hives Extraction from Windows OS through Tools and Scripts.
5. Data Carving Using Open Source Tools
6. Data Recovery and Secure deletion on Storage media.
7. Hiding Data into Slack Space.
8. Information gathering and network traffic analysis using TCP DUMP and WIN DUMP
9. Attacks and Forensics using IoT devices
10. Explore the Phases of Ethical Hacking in terms of implementing some attack.
11. Solving Case Study using online datasets from digitalcorpora.org
Text Books:
1. Kanellis, Panagiotis, “Digital Crime and Forensic Science in Cyberspace”, IGI Publishing,
ISBN 1591408733.
2. Brain Carrier, “File System Forensics Analysis”, Addison-Wesley Professional, 1 st Edition,
2005
3. Marshell, Angus M. (2008), “Digital Forensics: Digital Evidence in Criminal Investigation”,
Wiley Blackwell, ISBN 0470517751.
Reference Books:
1. Paul Crowley Dave Kleiman, “CD and DVD Forensics”, Syngress Publishing Inc, 2007
2. Chris Prosise, Kevin Mandia “ INCIDENT RESPONSE & COMPUTER FORENSICS”,
McGraw-Hill, 2nd Edition, 2003.
3. Rick Ayers, WayneJansenetal.,"Cell Phone Forensic Tools: An Overview andAnalysis",
NISTIR 7250,2010.
4. Paul CrowleyDaveKleiman, “CD and DVD Forensics”,SyngressPublishing Inc,2007.
Elective-I/II
Course Objectives:The course introduces reverse engineering techniques and explores the
techniques for detecting, analyzing, reverse engineering and eradicating malware.
Upon completion of the course, students should be able to:
Have a good understanding of reverse engineering techniques and tools
Identify the different types of malware analysis methods
Setup an environment for malware analysis
Recognize common malware characteristics
Prerequisites: Assembly language programming, OS fundamentals.
Syllabus:
Introduction to reverse engineering, Low level software, Assembly language primer, Compilers,
Execution Environments, Windows OS fundamentals, Executable file formats, Static & Dynamic
reverse engineering, Reversing tools, Disassemblers, Debuggers, Decompilers, System
monitoring tools, Reversing program binaries, Anti-reversing techniques, Breaking protections,
Reversing ‘.NET’, De-compilation, Introduction to malware, Software vulnerabilities – buffer
overflow, integer overflow, vulnerabilities exploitation, mitigation; Return oriented
159
programming; Reversing malware – Static & Dynamic malware analysis techniques, Packers &
compression, Sandboxing executables& runtime analysis; Malware classification.
Text Book:
1. EldadEilam, “Reversing: Secrets of Reverse Engineering”, Wiley publishing, 2005.
Reference Books:
1. Michael Ligh, Steven Adair, “Malware Analysts’s cookbook & DVD”, Wiley publishing
2. Michael Sikorski and Andrew Honig, Practical Malware Analysis, No Starch Press, 2012.
3. Erik Buchanan, Ryan Roemer, HovavShacham, and Stefan Savage. 2008. “When good
instructions go bad: generalizing return-oriented programming to RISC.”
Syllabus:
Principle of Cellular Communication, Overview 1G, 2G, 3G, 4G, LTE, 5G technologies.
Wireless Transmission: Frequencies for radio transmission, Signals, Antennas, Signal
Propagation, Multiplexing. Modulation, Spread spectrum, Cellular systems. Medium Access
Control: Motivation for a specialized MAC, SDMA, FDMA, TDMA, CDMA, Comparison.
GSM: Cellular Systems, Mobile Services, System Architecture, Radio Interface, Protocols,
Localization and calling, Handover, Security. Data services: GPRS, HSCSD Mobility
management: Handoff, Roaming Management, Handoff Detection Strategies, Channel
Assignment, Radio Link transfer, GSM Location Update, Mobility Databases, Failure
Restoration, VLR Overflow Control. Satellite Systems: GEO, LEO, MEO, Routing,
Localization, Handover. Wireless LAN: Infrared and radio transmission, Infrastructure and Ad-
hoc network, IEEE 802.11, Bluetooth. Mobile Device Platforms: Mobile OS, Palm Os, Win CE
and Symbian. Mobile Network Layer: Mobile IP, Mobile Ad-hoc Networks, Cellular Digital
Packet Data (CDPD), Wireless Local Loop (WLL) systems. Mobile Transport Layer: Traditional
TCP, Classical TCP Improvements, Mobile-TCP. Wireless Application Protocol (WAP): WAP
Architecture, Wireless Markup Language (WML), WML-Script, WAP 2.0. Wireless Network
Security: IEEE 802.11 Wireless LAN Attacks, Different Attack Tools, Different Types of
Security Mechanisms, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi
Protected Access –II (WPA-2), Deploying Secure Wireless networks, Security in Bluetooth,
Security in Adhoc Networks. Case Study: Android Application Development, Android Security.
Text/Reference Books:
1. Jochen Schiller, "Mobile Communication", 2nd Edition, Pearson Education.
2. Yi Bing Lin and ImrichChlamtac, "Wireless and Mobile Networks Architecture", John
Wiley & sons, 2001.
3. Ed Burnette, "Hello Android", Pragmatic Bookshelf; Third Edition edition, 2010.
4. Yan Zhang, Jun Zheng, Miao Ma, “Handbook of Research on Wireless Security”,
Volume 1, Idea Group Inc (IGI), 01-Jan-2008.
160