Reverse Engineering (5 cr)
Code: TTC6510-3003
General information
- Enrollment
-
01.08.2024 - 22.08.2024
Registration for the implementation has ended.
- Timing
-
26.08.2024 - 18.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Joonatan Ovaska
- Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
- Course
- TTC6510
Realization has 22 reservations. Total duration of reservations is 49 h 0 min.
Time | Topic | Location |
---|---|---|
Mon 26.08.2024 time 15:15 - 16:45 (1 h 30 min) |
Ethical hacking Moduuli info |
P2_D110
Auditorio
|
Tue 27.08.2024 time 12:15 - 13:45 (1 h 30 min) |
Reverse Engineering TTC6510-3003 |
P2_D436
Tietoliikennelaboratorio
|
Wed 28.08.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 30.08.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Tue 03.09.2024 time 12:15 - 13:45 (1 h 30 min) |
Reverse Engineering TTC6510-3003 |
P2_D436
Tietoliikennelaboratorio
|
Wed 04.09.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 06.09.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Tue 10.09.2024 time 12:15 - 13:45 (1 h 30 min) |
Reverse Engineering TTC6510-3003 |
P2_D436
Tietoliikennelaboratorio
|
Wed 11.09.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 13.09.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Tue 17.09.2024 time 12:15 - 13:45 (1 h 30 min) |
Reverse Engineering TTC6510-3003 |
P2_D436
Tietoliikennelaboratorio
|
Wed 18.09.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 20.09.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
Verkko/Online (KYHA)
|
Tue 24.09.2024 time 12:15 - 13:45 (1 h 30 min) |
Reverse Engineering TTC6510-3003 |
Verkko/Online (KYHA)
|
Wed 25.09.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
Verkko/Online (KYHA)
|
Fri 27.09.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
Verkko/Online (KYHA)
|
Wed 02.10.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 04.10.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Wed 09.10.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 11.10.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Wed 23.10.2024 time 09:00 - 11:30 (2 h 30 min) |
Workshop |
P2_D327
CISCO-laboratorio
|
Fri 25.10.2024 time 12:00 - 14:30 (2 h 30 min) |
Workshop |
P2_D436
Tietoliikennelaboratorio
|
Evaluation scale
0-5
Content scheduling
We start by going through whole course theory, after all theory parts, we'll continue with hands-on assignments for the rest of the course.
Objective
The student is aware of the methods to analyze and reverse engineer applications. After successfully passing this course, the student is able to perform simple reverse engineering tasks on X86 Windows and Linux binaries. The student understands the differences between static and dynamic analysis. The student is able to perform basic dynamic analysis tasks. The student understands the structure of PE binary files and how they can be analyzed using existing, widely available tools. The student learns how to document his/her findings in a report format that is understandable to a person with similar skills in reverse engineering
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
EUR-ACE: Multidisciplinary competences
Content
The course covers methodologies to analyze and reverse engineer binary files and applications using static and dynamic analysis. The course includes labs where the covered topics are put into practice.
Materials
Materials in the e-learning environment and the book: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- book
Exam schedules
No exam, assessment is based on assignments.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- reading assignments 10 h
- independent study 45 h
- assignment solving 60 h
- assignment reporting 10h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient (1): The student is familiar with the basic topics discussed during the course. The student is able to perform the most basic analysis on the simplest of X86 binaries using only some of the tools covered in the course with assistance.
Satisfactory (2): The student understands the most basic topics discussed during the course, however, he/she struggles to utilize this knowledge. The student is not able to search for relevant information independently. The student is able to analyze simple X86 binaries using the tools and techniques covered in the course with assistance.
Assessment criteria, good (3)
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases. The student is able to utilize information about the discussed topics. The student is able to analyze basic X86 binaries using the tools and techniques covered in the course.
Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in most common cases. The student is able to search and understand information about discussed topics. The student is able to analyze basic X86 binaries independently using tools covered in the course.
Assessment criteria, excellent (5)
Excellent (5): The student understands all topics discussed during the course and is able to use them in an innovative manner even in challenging situations. The student is able to search and utilize information about discussed topics independently. The student is able to analyze basic X86 binaries independently using tools covered in the course and utilize widely available tools not covered in the course.
Qualifications
Basics in Programming, Operating systems, Data structures and algorithms
Further information
Points from the quizzes and from the lab reports. No exam