Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

CURRICULUM TIPO:

1° Year 

ModulesCreditsTAFSSD
12
B
ING-INF/05
6
B
ING-INF/05
12
B
ING-INF/05

2° Year   activated in the A.Y. 2018/2019

ModulesCreditsTAFSSD
6
B
INF/01
6
B
ING-INF/05
Other activitites
4
F
-
Final exam
24
E
-
ModulesCreditsTAFSSD
12
B
ING-INF/05
6
B
ING-INF/05
12
B
ING-INF/05
activated in the A.Y. 2018/2019
ModulesCreditsTAFSSD
6
B
INF/01
6
B
ING-INF/05
Other activitites
4
F
-
Final exam
24
E
-
Modules Credits TAF SSD
Between the years: 1°- 2°
2 courses to be chosen among the following
6
C
INF/01
6
C
INF/01
6
C
INF/01
Between the years: 1°- 2°

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S003738

Credits

6

Language

Italian

Scientific Disciplinary Sector (SSD)

INF/01 - INFORMATICS

Period

II sem. dal Mar 1, 2018 al Jun 15, 2018.

Learning outcomes

The course aims to provide the theoretical and practical bases of the malevolent code. In particular, the course proposes techniques for the definition and classification of malicious code, analysis of malicious code and risk management.

At the end of the course, the student will have the necessary knowledge to understand the nature and evolution of the malicious code, anti-detection techniques and risk profiles. Furthermore, it will be able to perform reverse engineering of malicious code, identifying its essential components.

This knowledge will allow the student to classify the threats and their evolution deriving from malicious code based attacks.

The student will then be able to continue his/her studies autonomously in the field of computer security, studying new malicious codes and the respective countermeasures to mitigate their effects.

Program

Malware definitions, Taxonomy, theoretical virology, Malware life cycle, polymorphism and metamorphism, code similarity and similarity analysis, android malware, bot net, logic bomb, worms.

Reference texts
Author Title Publishing house Year ISBN Notes
Filiol, Eric Computer Viruses: from theory to applications Springer 2005 978-2-287-28099-3

Examination Methods

The students will be asked to produce home-works during the course and the reverse engineering of a given malware or the design of a new malware. Malware reverse engineering or the new malware design will be made by groups of at least 2 students and no more than 3 students. Students may freely choose which project do within the list proposed at the end of the course.

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE