|
|
|
||
Last update: doc. Mgr. Petr Kaplický, Ph.D. (09.02.2020)
|
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (17.01.2020)
web Capture the Flag https://ctftime.org/
Eilam Eldad, Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005.
Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2A: Instruction Set Reference, A-M, Intel Corporation, 2010.
Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, 2010. |
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (17.01.2020)
The goal of the seminar is to acquaint students with selected topics, mathematical tools and procedures of cryptography, steganography, binary analysis, reverse engeneering and mobile security with regard to their use in information security competitions Capture the Flag (CTF). There are three common types of CTFs: Jeopardy, Attack-Defence and mixed. Possible categories of CTFs/seminar: Crypto, Forensic, Mobile, Reverse and Web. Topics of the seminar will be chosen according to students' interest. The course is continuation of the seminar Cryptanalysis Upon the Level of Instructions. |