SubjectsSubjects(version: 945)
Course, academic year 2023/2024
   Login via CAS
Cryptanalysis upon the level of instructions - NMIB104
Title: Kryptoanalýza na úrovni instrukcí
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2018
Semester: summer
E-Credits: 2
Hours per week, examination: summer s.:0/2, C [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: cancelled
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Guarantor: prof. RNDr. Aleš Drápal, CSc., DSc.
Classification: Mathematics > Algebra
Is incompatible with: NMMB460, NMMB364
Is interchangeable with: NMMB460, NMMB364
Annotation -
Last update: JUDr. Dana Macharová (09.12.2010)
Introduction to instruction sets of common processors. Structure of basic binary formats. Analysis of attacks that can be relatively easily described and reproduced upon the instruction level
Literature -
Last update: JUDr. Dana Macharová (09.12.2010)

Eagle Chris, The IDA Pro Book, No Starch Press, 2008.

Eilam Eldad, Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture, Intel Corporation, 2010.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2A: Instruction Set Reference, A-M, Intel Corporation, 2010.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, 2010.

Microsoft Corporation, Microsoft Portable Executable and Common Object File Format Specification, Microsoft Corporation, 2010.

Mark E. Russinovich and David A. Solomon with Alex Ionescu, Windows Internals, Microsoft Press, 2009.

Syllabus -
Last update: JUDr. Dana Macharová (09.12.2010)

IA-32, ARM assembler. Structure of memory in operating systems.

Structure of executable files. Structure of common ciphers implementation. Impact of common coding mistakes. Stack / heap overflow. Generic defense against stack / heap overflow (image base randomization, NX bit). Advanced attacks - return oriented programming. Rootkits. Digital signatures.

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html