Studying at the University of Verona
Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.
Study Plan
This information is intended exclusively for students already enrolled in this course.If you are a new student interested in enrolling, you can find information about the course of study on the course page:
Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.
1° Year
Modules | Credits | TAF | SSD |
---|
2° Year activated in the A.Y. 2016/2017
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
Due insegnamenti a scelta
Legend | Type of training activity (TTA)
TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.
Malware (2016/2017)
Teaching code
4S003738
Teacher
Coordinator
Credits
6
Language
Italian
Scientific Disciplinary Sector (SSD)
INF/01 - INFORMATICS
Period
I sem. dal Oct 3, 2016 al Jan 31, 2017.
Learning outcomes
Malware is the art of breaking down and understanding how it works, how to identify them, and how to eliminate them. Malware design is instead its programming so that its analysis is difficult. The course introduces both of these aspects through practical examples and activities. The student will see some malicious techniques for malicious behavior and methods for engineering a malware. The main purpose of the course is to show the most popular masking techniques and to bring the student to have a critical knowledge of their design and implementation.
Program
Malware definitions, Taxonomy, theoretical virology, Malware life cycle, polymorphism and metamorphism, code similarity and similarity analysis, android malware, bot net, logic bomb, worms.
Examination Methods
The students will be asked to produce home-works during the course and the reverse engineering of a given malware or the design of a new malware. Malware reverse engineering or the new malware design will be made by groups of at least 2 students and no more than 3 students. Students may freely choose which project do within the list proposed at the end of the course.