À propos de ce cours
4.5
11 notes
Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business. Malicious Software and its Underground Economy: Two Sides to Every Story is a short, introductory, and experimental (i.e., pilot) course featuring 6 lectures. Each lecture lasts roughly anything between 1h and 1.5h and is logically divided in a number of ~15 mins self-contained units. Although a non-negligible effort has been made to fulfill this breakdown, some units last definitely longer and require a bit more effort---just pause the video and take a break ;-) In addition, the course features 6 multiple-choices mandatory quizzes (i.e., 1 per lecture) and 1 bonus quiz. Passing all the mandatory quizzes awards a "pass" mark of the course, while passing all the mandatory quizzes and the bonus one awards a "distinction" mark....
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Clock

Approx. 17 hours to complete

Recommandé : 7 hours/week...
Comment Dots

English

Sous-titres : English...
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Clock

Approx. 17 hours to complete

Recommandé : 7 hours/week...
Comment Dots

English

Sous-titres : English...

Programme du cours : ce que vous apprendrez dans ce cours

Week
1
Clock
3 heures pour terminer

Introduction

After reporting on the insights of a real-world research about a botnet takeover, students will learn about malicious software, with a particular glimpse at botnets and their detection to finally conlude brielfy with rootkits.<BR><BR><B>Lecture outline</B><BR>1. Should we care? A botnet takeover storytelling<BR>2. Admin blabbing<BR>3. Malicious software <BR>4. (a glimpse at)Botnets<BR>5. (a glimpse at) Botnets detection & Rootkits...
Reading
12 vidéos (Total 115 min), 1 lecture, 1 quiz
Video12 vidéos
Should we care? A botnet takeover storytelling11 min
Admin blabbing 11 min
Malicious Software (part 1) 10 min
Malicious Software (part 2) 9 min
(a glimpse at) Botnets (part 1) 10 min
(a glimpse at) Botnets (part 2) 6 min
(a glimpse at) Botnets (part 3) 10 min
(a glimpse at) Botnets detection and Rootkits (part 1)8 min
(a glimpse at) Botnets detection and Rootkits (part 2)9 min
(a glimpse at) Botnets detection and Rootkits (part 3)11 min
(a glimpse at) Botnets detection and Rootkits (part 4)13 min
Reading1 lecture
Module One Reading10 min
Quiz1 exercice pour s'entraîner
Week 1 — Quiz50 min
Week
2
Clock
3 heures pour terminer

Static analysis and its limitations

Students will look at the malware landscape of the early days and what effort and challenges the AV industry was facing to fight malware threats. The lecture covers static analysis as a first technique to analyze and detect malware; (basic) assembly and reverse engineering notions are provided with a look at basic techniques to fool the state-of-the-art disassembly algorithm, quickly highlighting the limits of static analysis, especially when focused on analyzing malware. A walk-through to reverse engineer an example program concludes the lecture.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Early days, AV industry<BR>2. (a glimpse at) Reverse engineering (part 1)<BR>3. (a glimpse at) Reverse engineering (part 2)<BR>4. (a glimpse at) Polymorphism, code obfuscation<BR>5. IDA Pro—a very simple example. . ....
Reading
8 vidéos (Total 99 min), 1 lecture, 1 quiz
Video8 vidéos
(a glimpse at) Reverse engineering (part 1.1) 11 min
(a glimpse at) Reverse engineering (part 1.2) 11 min
(a glimpse at) Reverse engineering (part 1.3) 8 min
(a glimpse at) Reverse engineering (part 2) 9 min
(a glimpse at) Polymorphism, code obfuscation 18 min
IDA Pro—a very simple example. . . (part 1) 10 min
IDA Pro—a very simple example. . . (part 2) 13 min
Reading1 lecture
Module Two Reading10 min
Quiz1 exercice pour s'entraîner
Week 2 — Quiz4 min
Week
3
Clock
3 heures pour terminer

Dynamic analysis and its limitations

While looking at how the malware landscape has been evolving, students will be given an introduction at dynamic analysis, a complementary technique to static analysis to fight malware threats. Packing and algorithmic-agnostic unpacking is introduced as an initial step toward full dynamic analysis. The lecture quickly mentions sandboxes and limits of dynamic analysis and sandboxes, to finally conclude with a brief overview of a particular academic research state-of-the-art for malware protection.<BR><BR>Given the complexity of the topic and the fact the course is a short and introductory class on a vast topic, the aim of the lecture is to provide a broad overview, with a few detailed insights wherever appropriate.<BR><BR><B>Lecture outline</b><BR><BR>1. Toward dynamic analysis<BR>2. (a glimpse at) Dynamic analysis (part 1)<BR>3. (a glimpse at) Dynamic analysis (part 2)<BR>4. (a glimpse at) Limits of dynamic analysisM<BR>5. AccessMiner—system-centric models...
Reading
7 vidéos (Total 87 min), 1 lecture, 1 quiz
Video7 vidéos
(a glimpse at) Dynamic analysis (part 1.1) 11 min
(a glimpse at) Dynamic analysis (part 1.2) 14 min
(a glimpse at) Dynamic analysis (part 2.1) 10 min
(a glimpse at) Dynamic analysis (part 2.2) 9 min
(a glimpse at) Limits of dynamic analysis 11 min
AccessMiner — system-centric models 15 min
Reading1 lecture
Module Three Reading10 min
Quiz1 exercice pour s'entraîner
Week 3 — Dynamic analysis and its limitations2 min
Week
4
Clock
2 heures pour terminer

Mobile malware

The lecture introduces the students to mobile malware threats; in particular, the lecture focuses on Android malware, providing a quick overview of Android applications and describing a <A href= "http://copperdroid.isg.rhul.ac.uk/">virtual machine-based dynamic analysis research</a> carried out in the <a href= "http://www.isg.rhul.ac.uk/">ISG</a> at <a href= "http://www.rhul.ac.uk/">Royal Holloway University of London</a> in collaboration with the <a href= "http://security.di.unimi.it/">LaSER</a> at <a href= "http://www.unimi.it/"> University of Milan</a>.<BR><BR><B>Lecture outline</B><BR><BR>1. Introduction<BR>2. Background<BR>3. CopperDroid: dynamic analysis of Android malware (part 1)<BR>4. CopperDroid: dynamic analysis of Android malware (part 2)...
Reading
4 vidéos (Total 49 min), 1 lecture, 1 quiz
Video4 vidéos
Background 12 min
Dynamic analysis of Android malware (part 1) 15 min
Dynamic analysis of Android malware (part 2) 10 min
Reading1 lecture
Module Four Reading10 min
Quiz1 exercice pour s'entraîner
Week 4 — Mobile malware52 min

Enseignant

Dr Lorenzo Cavallaro

Reader (Associate Professor)
Information Security Group, Royal Holloway, University of London

À propos de University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

Foire Aux Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.