Reverse Engineering and Vulnerability Analysis

This module explores reverse engineering and vulnerability analysis, focusing on the techniques used to dissect software and systems to discover security vulnerabilities and understand their underlying architecture.

Portal > Cybersecurity > Reverse Engineering and Vulnerability Analysis

Curriculum Builder

Dowd, M., McDonald, J., and J. Schuh. “The art of software security assessment identifying and preventing software vulnerabilities.” Addison-Wesley, 2007.

Dowd, Mark, McDonald, John, and Justin Schuh. “The Art of Software Security Assessment.” Addison-Wesley Professional, 2006.

Sikorski, Michael. “Practical Malware Analysis.” No Starch Press, 2012. (https://learning.oreilly.com/library/view/practical-malware-analysis/9781593272906/)

Wardle, Patrick. “The Art of Mac Malware.” No Starch Press, 2022. (https://learning.oreilly.com/library/view/the-art-of/9781098130206/)

Eilam, Eldad. “Reversing: Secrets of Reverse Engineering.” Wiley, 2005. (https://learning.oreilly.com/library/view/reversing-secrets-of/9780764574818/)

Sutton, Michael, and Greene Adam. “Fuzzing: Brute Force Vulnerability Discovery.” Addison Wesley, 2007. (https://learning.oreilly.com/library/view/fuzzing-brute-force/9780321446114/)

Dang et al. “Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools and Obfuscation.” Wiley, 2014. (https://learning.oreilly.com/library/view/practical-reverse-engineering/9781118787397/)

Klein, Tobias. “A Bug Hunter’s Diary.” No Starch Press, 2011. (https://learning.oreilly.com/library/view/a-bug-hunters/9781593273859/)

Saxe, Joshua, and Hillary Sanders. “Malware Data Science.” No Starch Press, 2018. https://learning.oreilly.com/library/view/malware-data-science/9781492067672/)

Perla, Enrico, and Massimiliano Oldani. “Computer Systems: A Programmer’s Perspective,” 2nd ed. Randal Bryant. A Guide to Kernel Exploitation: Attacking the Core, O’Reilly, 2016. (https://learning.oreilly.com/library/view/a-guide-to/9781597494861/)