Professor |
Frankie F.K. Li
|
Teaching assistants |
Ka Kin Ken Ma
Po Shing Ken Wong
|
Syllabus |
This course provides students a foundational knowledge about reverse
engineering and malware analysis, through the study of various cases and
hand-on analysis of malware samples. It covers fundamental concepts in
malware investigations so as to equip the students with enough background
knowledge in handling malicious software attacks. Various malware incidents
will be covered, such as cases in Ransomware, banking-Trojan,
state-sponsored and APT attacks, cases in Stuxnet and malicious software
attacks on Industrial Control System and IoT devices. With the experience of
studying these cases and analyzing selected samples, the students will be
able to understand the global cyber security landscape and its future
impact. Hands-on exercises and in-depth discussion will be provided to
enable students to acquire the required knowledge and skill set for
defending and protecting an enterprise network environment.
Students
should have programming/development skills (Assembly, C, C++, Python) and
knowledge in Operating System and computer network. |
Introduction by Professor |
Cybersecurity has become the top priority for any organizations in
protecting their digital assets or online activities. Modern sophisticated
adversaries can easily find vulnerabilities and make exploits to launch
attacks for financial gains or as a way to achieve specific objectives. Cases of denial-of-service attacks to business servers, leakage of business
and customer private information, advance malware attacks, fraudulent and
malicious websites are found very common in the daily news. This module
provides you with basic knowledge in malware analysis processes and their
complexities as well as illustrate on how to build an analytical capability
best suited enterprises environment. The tools and techniques presented in
this course are intended for students to analyze selected samples in
virtualization test-bed, so they can think like a hacker to understand the
Tactic, Technique and Procedures (TTP) of malware authors. |
Learning Outcomes |
|
Pre-requisites |
Students should have
programming/development skills (Assembly, C, C++, Python) and knowledge in
Operating System and computer network. |
Compatibility |
Mutually exclusive with: COMP7804
E-commerce security cases and technologies |
Topics covered |
|
Assessment |
|
Course materials |
Recommended readings:
- Practical Malware Analysis: The Hands-On Guide to
Dissection Malicious Software by Michael Sikorski and Andrew
Honig, Mar 2012
- Windows Malware Analysis Essentials, by Victor Marak,
August 2015.
- Learning Malware Analysis: Explore the concepts, tools,
and techniques to analysze and investigate Windows malware
by Monnappa K A, Jun 2018
|
Session dates |
|
Add/drop |
16 January, 2023 - 4 February, 2023 |
Maximum class size |
148 |