COS 432: Software Reverse Engineering and Analysis

A study of defensive programming techniques, platform security, secure software engineering, software reverse engineering, and vulnerability analysis. Students will perform static and dynamic software analysis, identify and analyze malicious software, and apply tools and techniques for identifying software vulnerabilities. Prerequisite: COS 284

Cybersecurity Knowledge Areas

  • Defensive Programming
  • Platform Security
  • Secure Software Engineering
  • Software Reverse Engineering
  • Vulnerability Analysis

Coverage

CAE 2014 Topics

  • Vulnerability Analysis (tier 3)
    • Definition of vulnerability
  • Software Reverse Engineering (tier 3)
    • Specification Recovery

CAE 2014 Outcomes

  • Vulnerability Analysis (tier 3)
    • Students will be able to describe characteristics of malware.
  • Software Reverse Engineering (tier 3)
    • Students will be able to use a common SW RE tool to safely perform static and dynamic analysis of software (or malware) of unknown origin for the purposes of recovering the original implementation and/or understanding the software functionality.

ACM 2013 Outcomes

  • Defensive Programming (tier 2)
    • Explain the risks with misusing interfaces with third-party code and how to correctly use third-party code
  • Platform Security (tier 3)
    • Explain the concept of code integrity and code signing and the scope it applies to
  • Secure Software Engineering (tier 3)
    • Describe the requirements for integrating security into the SDL

236 W. Reade Ave., Upland, IN 46989 · 765-998-5162 · cseinfo@cse.taylor.edu
Copyright © 2016 Taylor University Computer Science and Engineering