020CVRES5 | Computer Virology |
---|---|
![]() |
Introduction: The taxonomy of malware and its capabilities, History of malware – Reverse engineering: tools, obfuscation, packers, anti-debug techniques, x86 and x64 Assembly, Binary Code Analysis – Buffer overflows: Memory Corruption Bugs, Stack Overflow, Format String Attack, Integer Overflow, Fuzzing, Exploitation and Mitigation Techniques, Protection Mechanisms – The theory of malware: Turing Machine, The Halting Problem and Decidability, Adleman’s proof of the undecidability of the presence of a virus, Cohen’s experiments on detectability and self-obfuscation – Self-reproducing Malware: script and macro-virus, executable file virus, system virus and rootkit, Antivirus: Antivirus techniques, Antivirus Relay, Protection techniques, Antivirus Benchmarking and Testing – SPAM: Common techniques of SPAM and SPAM filtering. Temps présentiel : 30 heures Charge de travail étudiant : 70 heures Méthode(s) d'évaluation : Examen final, Examen partiel, Travail personnel |