Abstract | ||
---|---|---|
The ability to reverse engineer binary code is a skill of critical importance within computer security: deciding if an unknown piece of binary code is malicious and, if so, what it does. And yet, there is very little work in computer science education that considers how reverse engineering can be effectively taught. This is a timely area to examine, given that the demand for skilled security professionals continues to rise, while emphasis on low-level topics diminishes. How can we teach students the skills and thought processes underlying reverse engineering?
We present a set of exercises designed to help teach reverse engineering in a graduated fashion to students, along with our experience using them in a computer security course. In addition to some specifically constructed exercises, we have developed two tools that can be used to generate an arbitrary number of examples. And, to highlight learning the thought processes for reverse engineering, one of our exercises is a physical board game that we have designed, built, and used in the classroom. We report on our experience and some results from a formal evaluation of our exercises, and look at areas beyond computer security where reverse engineering training is useful.
|
Year | DOI | Venue |
---|---|---|
2018 | 10.1145/3197091.3197111 | ITiCSE |
Keywords | Field | DocType |
binary reverse engineering, computer security, malicious software, exercises, board game | Computer science,Reverse engineering,Binary code,Malware,Multimedia | Conference |
ISBN | Citations | PageRank |
978-1-4503-5707-4 | 0 | 0.34 |
References | Authors | |
7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
John Aycock | 1 | 351 | 33.03 |
Andrew Groeneveldt | 2 | 0 | 0.34 |
Hayden Kroepfl | 3 | 0 | 0.34 |
Tara Copplestone | 4 | 0 | 0.34 |