School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

Please note that given the circumstances of COVID-19, there may be some modifications to the assessment schedule promoted in Handbook for Semester 1 2020 Units. Students will be notified of all approved modifications by Unit Coordinators via email and Unit Blackboard sites. Where changes have been made, these are designed to ensure that you still meet the unit learning outcomes in the context of our adjusted teaching and learning arrangements.

  • Unit Title

    Software Reverse Engineering
  • Unit Code

    CSI2107
  • Year

    2020
  • Enrolment Period

    1
  • Version

    2
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online
  • Unit Coordinator

    Dr Mohiuddin AHMED

Description

Software reverse engineering is the art and science of determining the functionality and means of operation of unknown software. This unit explores the core tools and techniques used by cyber security specialists when encountering potentially malicious or otherwise interesting software. Successful students will learn the skills required to discover the true purpose of software in the absence of source code or other documentation. These skills are key for any incident responder dealing with cyber incidents and intrusion.

Prerequisite Rule

Must have passed CSP1150. Must have passed ENS1161. Must have passed CSI1101. Must have passed CSI1241.

Learning Outcomes

On completion of this unit students should be able to:

  1. Document the use of software reverse engineering techniques as a component of incident response.
  2. Analyse potential malware or interesting software.
  3. Apply established tools and techniques to examine unknown binaries.

Unit Content

  1. Structure of executables for common architectures.
  2. Functionality of the execution stack.
  3. Deriving function calls from disassembled code.
  4. Extracting structural information.
  5. Unpacking of protected executables.
  6. Deobfuscating obfuscated executables.
  7. Common tools and techniques.
  8. Automation of software reverse engineering tasks.
  9. Static and dynamic analysis techniques.

Learning Experience

ON-CAMPUS

Students will attend on campus classes as well as engage in learning activities through ECU Blackboard.

JoondalupMount LawleySouth West (Bunbury)
Semester 213 x 2 hour workshopNot OfferedNot Offered

For more information see the Semester Timetable

ONLINE

Students will engage in learning experiences through ECU Blackboard as well as additional ECU learning technologies.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
ExerciseOnline quiz10%
AssignmentReview of Reverse Engineering Methodologies15%
ProjectApplied Reverse Engineering Analysis 40%
ExaminationEnd of Semester Examination35%
ONLINE
TypeDescriptionValue
ExerciseOnline quiz10%
AssignmentReview of Reverse Engineering Methodologies15%
ProjectApplied Reverse Engineering Analysis40%
ExaminationEnd of Semester Examination35%

Core Reading(s)

  • Yurichev, D. (2015). Reverse engineering for beginners. Kyiv, Ukraine: Author. Retrieved from https://beginners.re/RE4B-EN.pdf

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2107|2|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

Please note that given the circumstances of COVID-19, there may be some modifications to the assessment schedule promoted in Handbook for this unit. All assessment changes will be published by 27 July 2020. All students are reminded to check handbook at the beginning of semester to ensure they have the correct outline.

  • Unit Title

    Software Reverse Engineering
  • Unit Code

    CSI2107
  • Year

    2020
  • Enrolment Period

    2
  • Version

    2
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online
  • Unit Coordinator

    Dr Mohiuddin AHMED

Description

Software reverse engineering is the art and science of determining the functionality and means of operation of unknown software. This unit explores the core tools and techniques used by cyber security specialists when encountering potentially malicious or otherwise interesting software. Successful students will learn the skills required to discover the true purpose of software in the absence of source code or other documentation. Students will be familiarized with a wide range of tools and techniques to analyse malware and develop countermeasures. The state-of-the-art malware and corresponding research will also be explored. These skills are key for any incident responder dealing with cyber incidents and intrusion.

Prerequisite Rule

Must have passed CSP1150. Must have passed ENS1161. Must have passed CSI1101. Must have passed CSI1241.

Learning Outcomes

On completion of this unit students should be able to:

  1. Document the use of software reverse engineering techniques as a component of incident response.
  2. Analyse potential malware or interesting software.
  3. Apply established tools and techniques to examine unknown binaries.

Unit Content

  1. Structure of executables for common architectures.
  2. Functionality of the execution stack.
  3. Deriving function calls from disassembled code.
  4. Extracting structural information.
  5. Unpacking of protected executables.
  6. Deobfuscating obfuscated executables.
  7. Common tools and techniques.
  8. Automation of software reverse engineering tasks.
  9. Static and dynamic analysis techniques.

Learning Experience

ON-CAMPUS

Students will attend on campus classes as well as engage in learning activities through ECU Blackboard.

JoondalupMount LawleySouth West (Bunbury)
Semester 213 x 2 hour workshopNot OfferedNot Offered

For more information see the Semester Timetable

ONLINE

Students will engage in learning experiences through ECU Blackboard as well as additional ECU learning technologies.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentReview of Reverse Engineering Tools20%
TestMid-semester Quiz10%
ProjectApplied Reverse Engineering Analysis 40%
AssignmentMalware Defence White Paper and Video Reflection30%
ONLINE
TypeDescriptionValue
AssignmentReview of Reverse Engineering Tools20%
TestMid-semester Quiz10%
ProjectApplied Reverse Engineering Analysis40%
AssignmentMalware Defence White Paper and Video Reflection30%

Core Reading(s)

  • Yurichev, D. (2015). Reverse engineering for beginners. Kyiv, Ukraine: Author. Retrieved from https://beginners.re/RE4B-EN.pdf

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI2107|2|2