Module overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Software analysis
- Reverse Engineering of Software
- Common issues affecting the security of software systems
Subject Specific Practical Skills
Having successfully completed this module you will be able to:
- Identify security weaknesses in software systems and applications
- Undertake basic reverse engineering of software
Transferable and Generic Skills
Having successfully completed this module you will be able to:
- Recognise software vulnerabilities and protection in a range of application domains
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Describe specific methods for exploiting software systems
Syllabus
Learning and Teaching
Teaching and learning methods
| Type | Hours |
|---|---|
| Follow-up work | 18 |
| Revision | 10 |
| Wider reading or practice | 22 |
| Completion of assessment task | 46 |
| Teaching | 36 |
| Preparation for scheduled sessions | 18 |
| Total study time | 150 |
Resources & Reading list
Textbooks
Dieter Gollman (2011). Computer Security. Wiley.
Eldad Eilam (2005). Reversing: Secrets of Reverse Engineering. John Wiley and Sons.
Assessment
Summative
This is how we’ll formally assess what you have learned in this module.
| Method | Percentage contribution |
|---|---|
| Continuous Assessment | 100% |
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
| Method | Percentage contribution |
|---|---|
| Set Task | 100% |
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
| Method | Percentage contribution |
|---|---|
| Set Task | 100% |
Repeat Information
Repeat type: Internal & External