MIT: Independent Activities Period: IAP

IAP 2016



Software Reverse Engineering

Tim Leek, Jeremy Blackthorne, Patrick Hulin

Jan/04 Mon 01:00PM-05:00PM NE 45 2nd floor
Jan/05 Tue 01:00PM-05:00PM NE 45 2nd floor
Jan/06 Wed 01:00PM-05:00PM NE 45 2nd floor
Jan/07 Thu 01:00PM-05:00PM NE 45 2nd floor
Jan/08 Fri 01:00PM-05:00PM NE 45 2nd floor

Enrollment: Limited: Advance sign-up required
Sign-up by 01/01
Limited to 30 participants
Attendance: Participants must attend all sessions
Prereq: see description.

Software reverse engineering (RE) is the process of discovering undocumented internals in computer programs. RE is a critical activity in cyber operations not just in the government sector, but also in industry, finance, and anywhere that computer programs and information need to be protected. It is also fun and challenging! This course will provide a brief, hands-on, immersive introduction to RE. The course will driven by hands-on labs with theory and visual aids as needed. On days one through four, students will cover static and dynamic analysis of programs. The class will then culminate on the fifth day, with students tackling a single large RE challenge.

Prereq: Students are expected to have a familiarity with programming, assembly, and enjoy problem solving. We will not be programming assembly but we will be looking at programs and their disassembly. No previous reverse engineering experience is expected.

* This work is sponsored by the Air Force under Air Force Contract FA8721-05-C-0002.  Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government.

Sponsor(s): MIT-SUTD Collaboration, Lincoln Laboratory, Electrical Engineering and Computer Science
Contact: Tim Leek, tleek@ll.mit.edu