This is a guest post from Su Gim Goh of F-Secure Labs.
Last Wednesday marked the beginning of our first lecture at the Aalto University (Espoo campus) in Finland for our Reverse Engineering Malware course for the spring 2013 semester. This course expands and continues F-Secure’s longstanding efforts to promote education in information security, which started in 2008 with a course in Malware Analysis and Antivirus Technologies with the Helsinki University of Technology.
Aalto University’s Reverse Engineering Malware course is taught by security researchers from our Security Lab in Helsinki. The program teaches students about what malicious code is, how it can be analyzed, and how to reverse engineer executable code for different platforms, such as Windows and Android.
Towards the end of the course, students are also exposed to more advanced topics, such as understanding the latest techniques in binary obfuscation and exploits. The syllabus is designed to encourage a very hands-on approach to learning reverse engineering. Our security researchers personally craft exercises and lab assignments to help students gain an understanding of how malicious code works, for example by looking for hidden messages in the code (with keys to help them to achieve the goal of the exercise, as seen in the example below).
Do note that F-Secure does not use or write real world malware in our academic courses. F-Secure strives to positively motivate programmers and includes modules that cover topics like ethics and legal issues in the course to encourage them to use their skills for a good cause – helping to protect the end user.
Over the other side of the world in Kuala Lumpur, Malaysia, where our other Security Lab is located to cater for the Asia Pacific region, we are partnering with Monash University (Sunway Campus) for the first time to develop a similar Malware Analysis syllabus, with a greater focus on the Android platform. The growing dominance of the Android platform in the smartphone market has also led to a tremendous growth in malware targeting devices using that operating system.
In conjunction with the lecturers from the School of Information Technology of the Sunway campus, and several security researchers from F-Secure’s Kuala Lumpur Security Lab, we are developing the syllabus from the ground up with brand new lecture and lab materials to help students whom are active in the security field gain a broader perspective of this field, as well as develop the specialized skills needed for analyzing malware. Subjects and techniques covered in the lectures and lab sessions include, among others interesting topics, understanding the Android security framework, the operating and file systems, static and dynamic analysis of malware.
For those who are interested in understanding executable code inside out (literally) and are passionate about security, this is definitely the course for you! You can follow along on the Labs’ weblog for updates.
This is a guest post from F-Secure fellow Kamil Janowski. Have you ever worked on…
August 17, 2017