课程信息
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
完成时间(小时)

完成时间大约为17 小时

建议:8 hours/week...
可选语言

英语(English)

字幕:英语(English)
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
完成时间(小时)

完成时间大约为17 小时

建议:8 hours/week...
可选语言

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 3 小时

Introduction

After reporting on the insights of a real-world research about a botnet takeover, students will learn about malicious software, with a particular glimpse at botnets and their detection to finally conlude brielfy with rootkits.<BR><BR><B>Lecture outline</B><BR>1. Should we care? A botnet takeover storytelling<BR>2. Admin blabbing<BR>3. Malicious software <BR>4. (a glimpse at)Botnets<BR>5. (a glimpse at) Botnets detection & Rootkits...
Reading
12 个视频 (总计 115 分钟), 1 个阅读材料, 1 个测验
Video12 个视频
Should we care? A botnet takeover storytelling11分钟
Admin blabbing 11分钟
Malicious Software (part 1) 10分钟
Malicious Software (part 2) 9分钟
(a glimpse at) Botnets (part 1) 10分钟
(a glimpse at) Botnets (part 2) 6分钟
(a glimpse at) Botnets (part 3) 10分钟
(a glimpse at) Botnets detection and Rootkits (part 1)8分钟
(a glimpse at) Botnets detection and Rootkits (part 2)9分钟
(a glimpse at) Botnets detection and Rootkits (part 3)11分钟
(a glimpse at) Botnets detection and Rootkits (part 4)13分钟
Reading1 个阅读材料
Module One Reading10分钟
Quiz1 个练习
Week 1 — Quiz50分钟
2
完成时间(小时)
完成时间为 3 小时

Static analysis and its limitations

Students will look at the malware landscape of the early days and what effort and challenges the AV industry was facing to fight malware threats. The lecture covers static analysis as a first technique to analyze and detect malware; (basic) assembly and reverse engineering notions are provided with a look at basic techniques to fool the state-of-the-art disassembly algorithm, quickly highlighting the limits of static analysis, especially when focused on analyzing malware. A walk-through to reverse engineer an example program concludes the lecture.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Early days, AV industry<BR>2. (a glimpse at) Reverse engineering (part 1)<BR>3. (a glimpse at) Reverse engineering (part 2)<BR>4. (a glimpse at) Polymorphism, code obfuscation<BR>5. IDA Pro—a very simple example. . ....
Reading
8 个视频 (总计 99 分钟), 1 个阅读材料, 1 个测验
Video8 个视频
(a glimpse at) Reverse engineering (part 1.1) 11分钟
(a glimpse at) Reverse engineering (part 1.2) 11分钟
(a glimpse at) Reverse engineering (part 1.3) 8分钟
(a glimpse at) Reverse engineering (part 2) 9分钟
(a glimpse at) Polymorphism, code obfuscation 18分钟
IDA Pro—a very simple example. . . (part 1) 10分钟
IDA Pro—a very simple example. . . (part 2) 13分钟
Reading1 个阅读材料
Module Two Reading10分钟
Quiz1 个练习
Week 2 — Quiz4分钟
3
完成时间(小时)
完成时间为 3 小时

Dynamic analysis and its limitations

While looking at how the malware landscape has been evolving, students will be given an introduction at dynamic analysis, a complementary technique to static analysis to fight malware threats. Packing and algorithmic-agnostic unpacking is introduced as an initial step toward full dynamic analysis. The lecture quickly mentions sandboxes and limits of dynamic analysis and sandboxes, to finally conclude with a brief overview of a particular academic research state-of-the-art for malware protection.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Toward dynamic analysis<BR>2. (a glimpse at) Dynamic analysis (part 1)<BR>3. (a glimpse at) Dynamic analysis (part 2)<BR>4. (a glimpse at) Limits of dynamic analysisM<BR>5. AccessMiner—system-centric models...
Reading
7 个视频 (总计 87 分钟), 1 个阅读材料, 1 个测验
Video7 个视频
(a glimpse at) Dynamic analysis (part 1.1) 11分钟
(a glimpse at) Dynamic analysis (part 1.2) 14分钟
(a glimpse at) Dynamic analysis (part 2.1) 10分钟
(a glimpse at) Dynamic analysis (part 2.2) 9分钟
(a glimpse at) Limits of dynamic analysis 11分钟
AccessMiner — system-centric models 15分钟
Reading1 个阅读材料
Module Three Reading10分钟
Quiz1 个练习
Week 3 — Dynamic analysis and its limitations2分钟
4
完成时间(小时)
完成时间为 2 小时

Mobile malware

The lecture introduces the students to mobile malware threats; in particular, the lecture focuses on Android malware, providing a quick overview of Android applications and describing a <A href= "http://copperdroid.isg.rhul.ac.uk/">virtual machine-based dynamic analysis research</a> carried out in the <a href= "http://www.isg.rhul.ac.uk/">ISG</a> at <a href= "http://www.rhul.ac.uk/">Royal Holloway University of London</a> in collaboration with the <a href= "http://security.di.unimi.it/">LaSER</a> at <a href= "http://www.unimi.it/"> University of Milan</a>.<BR><BR><B>Lecture outline</B><BR><BR>1. Introduction<BR>2. Background<BR>3. CopperDroid: dynamic analysis of Android malware (part 1)<BR>4. CopperDroid: dynamic analysis of Android malware (part 2)...
Reading
4 个视频 (总计 49 分钟), 1 个阅读材料, 1 个测验
Video4 个视频
Background 12分钟
Dynamic analysis of Android malware (part 1) 15分钟
Dynamic analysis of Android malware (part 2) 10分钟
Reading1 个阅读材料
Module Four Reading10分钟
Quiz1 个练习
Week 4 — Mobile malware52分钟

讲师

Avatar

Dr Lorenzo Cavallaro

Reader (Associate Professor)
Information Security Group, Royal Holloway, University of London

关于 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您购买证书后,将有权访问所有课程材料,包括评分作业。完成课程后,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心