CSI2107 Software Reverse Engineering Assignment

Assignment Help Software Engineering
Reference no: EM132650991 , Length: word count:4000

CSI2107 Software Reverse Engineering - Edith Cowan University

Assignment: Applied Reverse Engineering Analysis

Learning Outcome 1: Analyse potential malware or interesting software.
Learning Outcome 2: Apply established tools and techniques to examine unknown binaries.

Assignment Brief

This assignment requires that you demonstrate the practical use of the malware analysis techniques covered in this unit. Once you unzip the malware sample zip file, you will get five malware samples. Of the five, you must select two to be used in your assessment. You are encouraged to conduct a brief preliminary analysis of all allocated samples to inform your selection of samples. If you do not feel that your allocated samples are adequate, or there are any problems, please contact your lecturer or tutor as soon as possible for another allocation. For each of the two selected malware samples, you must conduct an in-depth reverse engineering effort to write an analysis report and prepare a presentation.

Submission Requirements Report
• Cover Page (Your ID & Malware sample details)
• Executive summary
• Identification of malware sample (if previously detected/named)
• Details of packing or obfuscation
• Details of architecture targeted by malware
• Details of malware behaviour
• At least two detection rules and explanation for these rules
• Detection and malware removal instructions

Presentation
Voice embedded PowerPoint presentation on Findings in 5-10 slides (10 minutes maximum)

Attachment:- Software Reverse Engineering.rar

Reference no: EM132650991

Questions Cloud

Different type of approach to leadership : The Psychodynamic Approach is yet another different type of approach to leadership.
Make the adjusting entry for the current year provision : Assume the same facts as except that Allowance for doubtful. Prepare the adjusting entry for the current year's provision for uncollectible accounts.
Freedom of Information : Provide an example in which it may be warranted to violate the morality of the freedom of information by publicizing a secret identity to prove a point
Compute Hosta charitable contribution deduction : The Hosta Trust reports gross rent income of $72,000, expenses attributable to the rents of $55,000, Compute Hosta charitable contribution deduction
CSI2107 Software Reverse Engineering Assignment : CSI2107 Software Reverse Engineering Assignment Help and Solution, Edith Cowan University - Assessment Writing Service - Analyse potential malware
Freedom of Speech : Review Texas v. Johnson. Evaluating Van Orden v. Perry, as a public administrator, in the rule of law, e
Compute trust accounting income : In addition, the trust recognizes a $2,500 long-term capital gain. Compute trust accounting income, where the trust agreement allocates fees and capital gains
Prepare the adjusting entry for the current year provision : The current year's provision for uncollectible accounts. Prepare the adjusting entry for the current year's provision for uncollectible accounts
Battling Over Bottled Water : Battling Over Bottled Water, located here or on page 109 in your textbook. Nestlé holds a 99-year lease for the land that the Sanctuary Spring sits on.

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd