Kies op maat

Inloggen Menu

Software Reversing and Exploitation

Given the increased dependence on software in our lives and the ever-present misuse of security vulnerabilities in software by cyber attackers, this course aims to provide a deep dive into the field of reverse engineering software to find and exploit security vulnerabilities. The focus of this course will be on binary analysis under both the Windows and Linux operating systems. Students will be trained to view security issues from an attacker’s perspective to better understand what needs to be fixed and how. 

In order to properly fix security vulnerabilities in applications, a good understanding is required of how the application’s software works internally and how software interacts with computer operating systems.  

Students will be provided a deep dive into the theoretical background and will review key research papers from the history of binary analysis and (automated) vulnerability discovery, up to the current state-of-the-art. The instructors of this course have a strong belief in learning by using a hands-on approach. Students will be provided with technical challenges to solve via Capture the Flag education, during which students will evaluate tools and techniques actively used in the field. Students will also be provided with the opportunity to either choose to spend time on an individual learning track preparing for, or enroll in, a relevant (certification) program such as OSCP/OSCE or pwn.college. They may also choose to spend time on a group project to work together in answering a course related research question. This course will be assessed via presentations and portfolio assignments in which students are required to provide write-ups on their approach and explain why related theory is important for their learning. 

Target group:

This is an advanced course for students who have a strong interest in the technical side of information security.

Leerdoelen

See, General Objectives (Onderwerp). Competencies / final objectives are at the university of applied sciences level.

Ingangseisen

This course is for students who are near the end of their bachelor education. Background knowledge in reading and writing software is preferred and students should expect a steep learning curve in analyzing C code and Assembly language at the beginning of the course.

Literatuur

None, all material will be available online. 

Rooster

(1): One day a week (160 hours) will be spent on preparing for and attending lectures, exploring the theoretical background, where students will be tasked to actively contribute by presenting the insights from research papers and discussing the content.  

(2): Two days a week (320 hours), Students will be provided with technical hands-on challenges to solve via Capture the Flag education. 

(3): Two days a week (320 hours), students will have the opportunity to either choose to spend time on an individual learning track preparing for, or enroll in, a relevant (certification) program such as OSCP/OSCE or pwn.college. Alternatively, they may choose to spend time on a group project to work together in answering a course related research question.

Contact hours per week:

8 contact hours per week

Toetsing

See under 'Rooster' for the description of (1), (2) and (3): 

(1) Presentation, participation and lab assignments minimum pass rate: satisfactory 

(2) Portfolio on write-ups (50%), minimum pass rate: 4.5 

(3) Portfolio on learning track or project (50%), minimum pass rate: 4.5 

Minimum pass rate course: 5.5 

Assessment (1) will be throughout the course, based on the planning of the presentations. Assessment (2) and (3) will be at the end of the course.  

Aanvullende informatie

This course places great emphasis on hands-on learning.  Students will be encouraged to compete in ethical hacking competitions and coaching for these events can be provided. This course will be offered in-person at the HHS campus in Zoetermeer. 

Partners:

The Hague University, Centre of Expertise Cyber Security, Research Group Network and Systems Engineering Cyber Security.