This page is for the Online Masters Degree Program through Georgia Tech Professional Education.
Course Overview
This course covers advanced approaches for detecting the presence of vulnerabilities in binary software, the analysis of malicious software, and explores recent research and unsolved problems in software protection and forensics.
The goal of this course is to engage in critical discussion around key research topics in software security and forensics. This course will cover: Binary Program Analysis Principles, Binary Software Security, Software Forensics and Cyber Attack Response. Students will be required to study published research papers from the top-tier academic venues in computer security and cyber forensics.
Why take this course?: You are interested in learning the fundamental principles of dissecting malware, vulnerability finding/defense, and cyber attack triage. You want to read cutting-edge research publications on these topics. There is ample scope to publish in this area: This course can prepare you to conduct research in cyber attack forensics and malware analysis.
Basic Information
Instructor: Professor Brendan Saltaformaggio
Email: brendan@ece.gatech.edu
Office hours: Every Tuesday 9:00 am to 10:00 am EST.
TA: Andrew Phillips
Email: aphillips76@gatech.edu
Office hours: Every Thursday 8:00 pm to 9:00 pm EST.
Canvas (Lecture Slides, Assignments, Grades): https://canvas.gatech.edu
Ed Discussion (Questions, Announcements, Chat): Link In Canvas.
Materials
There is no required textbook for this course. Instead we will study published research papers from the top-tier academic venues in computer security and cyber forensics.
The following books are recommended for additional background or more in-depth understanding of the topics discussed in class. Read these books only if you want to learn more! They will not be covered in lectures or on exams!
-
Practical Tools/Techniques For Malware Reverse Engineering:
Michael Sikorski, Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012. ISBN: 978-1593272906 -
Practical Tools/Techniques For Memory Forensics:
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Wiley, 2014. ISBN: 978-1118825099 -
Background On Low-Level Computer Systems Programming:
Randal E. Bryant, David R. O'Hallaron. Computer Systems: A Programmer's Perspective. Pearson (3rd Edition), 2015. Online: http://csapp.cs.cmu.edu/. ISBN: 978-0134092669 -
A Great Reference For The IDA Pro Projects:
Chris Eagle. The IDA Pro Book. No Starch Press (2nd Edition), 2011. ISBN: 978-1593272890
You may be able to find this one online.
You may also need a copy of the Intel Developer’s manuals. These are free and available via this link:
http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html
It's large, but the best PDF to get is the combined set, downloadable via the first link on that page. If you have an iPad or other tablet, drop this PDF on it and read it whenever you have spare time.
Course Outline
- Binary Analysis Principles
- Static Analysis
- Static Binary Code Analysis Techniques/Tools
- Reverse Engineering
- Intro to Malware Classification and Triage
- Program Representations
- Pointer Analysis and Points-To
- Binary Code Control Flow Analysis
- Intro to Control Flow Integrity
- Dynamic Analysis
- Dynamic Program Tracing Techniques/Tools
- Program Profiling
- Dynamic Slicing
- Data Flow Tracking
- Practical Data Flow Integrity (e.g., libdtf)
- Symbolic Execution
- Deep Software Vulnerabilities
- Trigger Input Generation
- Automated Exploit Generation
- Static Analysis
- Binary Software Security
- Introduction to Software Security and Access Control
- Software Vulnerabilities
- Static Protection through Software Bug Finding
- Dynamic Vulnerability Discovery
- Malware Analysis
- Return of Malware Classification and Triage
- Android/iOS Malware
- Input Generator for Malware Triggering
- Software Defense
- Dynamic Defense Mechanisms
- Detecting Malicious Logic in Binaries
- Large-Scale Software Vetting
- Binary Program Hardening
- Return of Control Flow Integrity
- Software Forensics and Incident Response
- Memory Forensics
- Data Structure Reverse Engineering
- Value-Invariant Discovery
- Structural-Invariant Discovery
- Program-Analysis-Driven Evidence Recovery
- Data Structure Reverse Engineering
- Execution Recreation
- Postmortem Execution Analysis
- Relationships to Debugging
- Memory Forensics
Assigments & Grading
There will be 6 mini-projects during the Binary Analysis Principles portion of the class. 4 of the projects will be static analysis with Ghidra and 2 will be dynamic analysis with Pin. Each project will require careful time allocation to complete on time (1 or 2 week deadlines). Grades will be based on the results produced by your tool. For some mini-projects, we may schedule demos during office hours.
The mini-projects will cover the following topics:
- Intro. to Software Disassembly
- Manual Static Malware Reverse Engineering
- Automated Static Malware Analysis
- Static Data Dependence Detection
- Dynamic Control Flow Analysis
- Dynamic Control Dependence Detection
Grading Breakdown:
- 90% for the 6 mini-projects (15% each)
- 10% for paper reading slides & Piazza participation
Grading Scheme:
- A 100% to 90%
- B 90% to 80%
- C 80% to 70%
- D 70% to 60%
- F below 60%
Educational Objectives
- Learn and apply the fundamental principles of dissecting malware, vulnerability finding/defense, and cyber attack triage
- Become aware of limitations of existing defense mechanisms and how to avoid them
- Study cutting-edge research publications on these topics
- Engage in critical discussion around key research topics in software security and forensics
- Propose solutions to open-ended research problems and implement novel prototype solutions
Course Outcomes
After successfully completing this course, students should be able to:
- Identify and disarm common malware tactics
- Statically reverse engineer malware samples in a disassembler
- Build static analysis tools to automate control flow recovery and identify intractable indirect jumps
- Design and implement static analysis routines to perform automated data dependency tracking
- Instrument binary programs and malware to collect dynamic instruction traces
- Implement dynamic analysis tools to perform online control dependence tracking
- Read and present cutting-edge research publications relating to malware analysis, vulnerability finding/defense, and cyber attack triage
Honor Code
Students are expected to abide by the Georgia Tech Academic Honor Code. Honest and ethical behavior is expected at all times. All incidents of suspected dishonesty will be reported to and handled by the Office of Student Integrity. You will have to do all assignments individually unless explicitly told otherwise. You may discuss with classmates but you may not copy any solution (or any part of a solution).
Learning Accommodations
Whenever needed, the instructor will make accommodations for students with documented disabilities. These accommodations must be arranged in advance and in accordance with the Office of Disability Services.