Besuchen Sie uns bei Binding Hook Live am 27. Oktober im Underbelly Boulevard Soho in London
Begleiten Sie uns zu Binding Hook Live

Reverse Engineering und Schwachstellenanalyse

This module explores reverse engineering and vulnerability analysis, focusing on the techniques used to dissect software and systems to discover security vulnerabilities and understand their underlying architecture.

Portal > Cybersecurity > Reverse Engineering und Schwachstellenanalyse

Curriculum Builder

Perla, Enrico, und Oldani Massimiliano. Ein Leitfaden zur Kernel-Exploitation: Attacking the Core. 1st ed. Burlington, MA: Syngress, 2010.

Bryant, Randal E., and David R. O’Hallaron. Computer Systems: A Programmer’s Perspective Beta Version. Upper Saddle River, NJ: Prentice Hall, 2003.

Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. San Francisco, CA: No Starch Press, 2018.

Klein, Tobias. A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security. 1st ed. No Starch Press, 2011.

Dang, Bruce, Alexandre Gazet, Elias Bachaalany, and Sébastien Josse. Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. Indianapolis, Indiana: Wiley, 2014.

Sutton, Michael, Adam Greene, and Pedram Amini. Fuzzing: Brute Force Vulnerability Discovery. Upper Saddle River, NJ: Addison-Wesley, 2007.

Eilam, Eldad. Reversing: Secrets of Reverse Engineering. Wiley, 2005.

Wardle, Patrick. The Art of Mac Malware. No Starch Press, 2022.

Sikorski, Michael. “Practical Malware Analysis.” No Starch Press, 2012. (https://learning.oreilly.com/library/view/practical-malware-analysis/9781593272906/)

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Vielen Dank, dass Sie sich für unseren Newsletter angemeldet haben!

Dankeschön! RSVP erhalten für Perla, Enrico, und Oldani Massimiliano. Ein Leitfaden für Kernel-Exploitation: Attacking the Core. 1st ed. Burlington, MA: Syngress, 2010.

Vielen Dank für Ihre Bewerbung! Wir bleiben in Kontakt.

Bewerben Sie sich für: Perla, Enrico, und Oldani Massimiliano. A Guide to Kernel Exploitation: Attacking the Core. 1st ed. Burlington, MA: Syngress, 2010.

Perla, Enrico, und Oldani Massimiliano. Ein Leitfaden zur Kernel-Exploitation: Attacking the Core. 1st ed. Burlington, MA: Syngress, 2010.

Laden...

Laden...