Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
CSI2107 Software Reverse Engineering - Edith Cowan University
Assignment: Applied Reverse Engineering Analysis
Learning Outcome 1: Analyse potential malware or interesting software.Learning Outcome 2: Apply established tools and techniques to examine unknown binaries.
Assignment Brief
This assignment requires that you demonstrate the practical use of the malware analysis techniques covered in this unit. Once you unzip the malware sample zip file, you will get five malware samples. Of the five, you must select two to be used in your assessment. You are encouraged to conduct a brief preliminary analysis of all allocated samples to inform your selection of samples. If you do not feel that your allocated samples are adequate, or there are any problems, please contact your lecturer or tutor as soon as possible for another allocation. For each of the two selected malware samples, you must conduct an in-depth reverse engineering effort to write an analysis report and prepare a presentation.
Submission Requirements Report• Cover Page (Your ID & Malware sample details)• Executive summary• Identification of malware sample (if previously detected/named)• Details of packing or obfuscation• Details of architecture targeted by malware• Details of malware behaviour• At least two detection rules and explanation for these rules• Detection and malware removal instructions
PresentationVoice embedded PowerPoint presentation on Findings in 5-10 slides (10 minutes maximum)
Attachment:- Software Reverse Engineering.rar
Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.
A Case Study in C to Java Conversion and Extensibility
Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.
Write an report on a significant software security
Analysis, design and development of a small software system.
Systems Analysis and Design requirements
Create a complete limited entry decision table
Explain flow boundaries map the dfd into a software architecture using transform mapping.
Prepare a frame diagram for the software systems.
Identify computing devices, which could be used to support Your Improved Process
Design a wireframe prototype to meet the needs of the personas and requirements.
Explain the characteristics of Visual Studio 2005.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd