SubjectsSubjects(version: 945)
Course, academic year 2023/2024
   Login via CAS
Cryptanalysis Upon the Level of Instructions - NMMB460
Title: Kryptoanalýza na úrovni instrukcí
Guaranteed by: Department of Algebra (32-KA)
Faculty: Faculty of Mathematics and Physics
Actual: from 2021
Semester: summer
E-Credits: 4
Hours per week, examination: summer s.:0/4, C [HT]
Capacity: unlimited
Min. number of students: unlimited
4EU+: no
Virtual mobility / capacity: no
State of the course: taught
Language: Czech
Teaching methods: full-time
Teaching methods: full-time
Note: you can enroll for the course repeatedly
Guarantor: Mgr. Milan Boháček
Class: M Mgr. MMIB
M Mgr. MMIB > Volitelné
Classification: Informatics > External Subjects
Mathematics > Algebra
Incompatibility : NMIB104
Interchangeability : NMIB104
Annotation -
Last update: T_KA (14.05.2013)
Introduction to instruction sets of common processors. Structure of basic binary formats. Analysis of attacks that can be relatively easily described and reproduced upon the instruction level
Course completion requirements - Czech
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (09.10.2017)

Zápočet je za odevzdání samostatně vypracovaného řešení crackme přiměřené obtížnosti. Charakter zápočtu umožňuje jeho opakování.

Literature -
Last update: T_KA (14.05.2013)

Eagle Chris, The IDA Pro Book, No Starch Press, 2008.

Eilam Eldad, Reversing: Secrets of Reverse Engineering, Wiley Publishing, 2005.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture, Intel Corporation, 2010.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2A: Instruction Set Reference, A-M, Intel Corporation, 2010.

Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, 2010.

Microsoft Corporation, Microsoft Portable Executable and Common Object File Format Specification, Microsoft Corporation, 2010.

Mark E. Russinovich and David A. Solomon with Alex Ionescu, Windows Internals, Microsoft Press, 2009.

Syllabus -
Last update: T_KA (14.05.2013)

IA-32, ARM assembler. Structure of memory in operating systems.

Structure of executable files. Structure of common ciphers implementation. Impact of common coding mistakes. Stack / heap overflow. Generic defense against stack / heap overflow (image base randomization, NX bit). Advanced attacks - return oriented programming. Rootkits. Digital signatures.

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html