052012 VU Software Security (2023W)
Continuous assessment of course work
Labels
Registration/Deregistration
Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).
- Registration is open from We 13.09.2023 09:00 to We 20.09.2023 09:00
- Deregistration possible until Sa 14.10.2023 23:59
Details
max. 25 participants
Language: English
Lecturers
Classes (iCal) - next class is marked with N
- Wednesday 04.10. 11:30 - 13:00 Hörsaal 1, Währinger Straße 29 1.UG
- Monday 23.10. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 13.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 27.11. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 11.12. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 08.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
- Monday 22.01. 09:45 - 13:00 PC-Seminarraum 3, Kolingasse 14-16, OG02
Information
Aims, contents and method of the course
Students learn which methods exist for protecting software against reverse engineering and how they can be integrated into a software development process. For this purpose, algorithms for code obfuscation (protection against program analysis), software watermarking and fingerprinting (protection against unauthorized distribution), and software tamperproofing (protection against modification) are discussed. Furthermore, students become familiar with the basics of program analysis and know which techniques are used to perform reverse engineering attacks on programs. Students learn to evaluate the strength of a protection technique based on potency, resilience, stealth, and cost.
Assessment and permitted materials
The grading will follow the following scheme:
- 4 practical assignments (15% each); 60% in total
- Written closed-book exam (multiple-choice) on the course content (40%)
- 4 practical assignments (15% each); 60% in total
- Written closed-book exam (multiple-choice) on the course content (40%)
Minimum requirements and assessment criteria
theoretical and practical knowledge on how software can be protected against reverse engineering; basic binary reverse engineering knowledgeGrading:
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))
Examination topics
Written exam:
All contents that are being presented in the lectures, including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (individual work)
All contents that are being presented in the lectures, including the slides, pictures and diagrams drawn on the board, oral clarifications of the lecturers and the book.Assignments:
4 hands-on assignments (individual work)
Reading list
Nagra, J., & Collberg, C. (2009). Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.
Association in the course directory
Last modified: Su 24.09.2023 13:47