Unitevi a noi al Binding Hook Live il 27 ottobre all'Underbelly Boulevard Soho di Londra.
Unitevi a noi al Binding Hook Live

Reverse Engineering e analisi delle vulnerabilità

This module explores reverse engineering and vulnerability analysis, focusing on the techniques used to dissect software and systems to discover security vulnerabilities and understand their underlying architecture.

Portale > Sicurezza informatica > Reverse Engineering e analisi delle vulnerabilità

Costruttore di programmi di studio

Perla, Enrico e Oldani Massimiliano. Guida allo sfruttamento del kernel: Attaccare il nucleo. 1a ed. Burlington, MA: Syngress, 2010.

Bryant, Randal E., and David R. O’Hallaron. Computer Systems: A Programmer’s Perspective Beta Version. Upper Saddle River, NJ: Prentice Hall, 2003.

Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. San Francisco, CA: No Starch Press, 2018.

Klein, Tobias. A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security. 1st ed. No Starch Press, 2011.

Dang, Bruce, Alexandre Gazet, Elias Bachaalany, and Sébastien Josse. Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. Indianapolis, Indiana: Wiley, 2014.

Sutton, Michael, Adam Greene, and Pedram Amini. Fuzzing: Brute Force Vulnerability Discovery. Upper Saddle River, NJ: Addison-Wesley, 2007.

Eilam, Eldad. Reversing: Secrets of Reverse Engineering. Wiley, 2005.

Wardle, Patrick. The Art of Mac Malware. No Starch Press, 2022.

Sikorski, Michael. “Practical Malware Analysis.” No Starch Press, 2012. (https://learning.oreilly.com/library/view/practical-malware-analysis/9781593272906/)

Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.

Grazie per esserti iscritto alla nostra newsletter!

Grazie! RSVP ricevuto per Perla, Enrico, e Oldani Massimiliano. Guida allo sfruttamento del kernel: Attaccare il nucleo. 1a ed. Burlington, MA: Syngress, 2010.

Grazie per aver fatto domanda! Ci metteremo in contatto con voi.

Candidatura per: Perla, Enrico e Oldani Massimiliano. Guida allo sfruttamento del kernel: Attaccare il nucleo. 1a ed. Burlington, MA: Syngress, 2010.

Perla, Enrico e Oldani Massimiliano. Guida allo sfruttamento del kernel: Attaccare il nucleo. 1a ed. Burlington, MA: Syngress, 2010.

Caricamento...

Caricamento...