Studying at the University of Verona
Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.
Study Plan
This information is intended exclusively for students already enrolled in this course.If you are a new student interested in enrolling, you can find information about the course of study on the course page:
Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.
1° Year
Modules | Credits | TAF | SSD |
---|
2° Year activated in the A.Y. 2010/2011
Modules | Credits | TAF | SSD |
---|
Tre insegnamenti a scelta tra i seguenti
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Tre insegnamenti a scelta tra i seguenti
Modules | Credits | TAF | SSD |
---|
Legend | Type of training activity (TTA)
TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.
Static analysis and code protection (2010/2011)
Teaching code
4S02908
Teacher
Coordinator
Credits
6
Language
Italian
Scientific Disciplinary Sector (SSD)
ING-INF/05 - INFORMATION PROCESSING SYSTEMS
Period
II semestre dal Mar 1, 2011 al Jun 15, 2011.
Learning outcomes
The goal is to reach a deep comprehension and development ability in program analysis and protection. The application area concerns the development of tools for analysis an code certification, reverse engineering of code and code protection against theft (IPP). Particular emphasis is devoted to code protection by code obfuscation, watermarking, tamper-proofing and code attack by malware.
Program
Program analysis: Anomaly classification, risk analysis and management, static and dynamic, debugging, dataflow Analysis, 0-CFA, intra- e Inter-procedural analysis, Abstract interpretation. Attack techniques and protection:
Code transformation, reverse engineering, program monitors, code slicing,
code obfuscation, SW watermarking, finger-printing and tamper-proofing, program diversification and evolution. Malware analysis, polymorphism and metamorphism. Legal issues in code analysis, attack and protection.
Examination Methods
Cooperative project in SPY-Lab on code analysis and/or protection.