Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

This information is intended exclusively for students already enrolled in this course.
If you are a new student interested in enrolling, you can find information about the course of study on the course page:

Laurea magistrale in Ingegneria e scienze informatiche - Enrollment from 2025/2026

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

CURRICULUM TIPO:

1° Year 

ModulesCreditsTAFSSD
12
B
ING-INF/05
6
B
ING-INF/05
6
B
ING-INF/05
12
B
ING-INF/05

2° Year   activated in the A.Y. 2013/2014

ModulesCreditsTAFSSD
6
B
INF/01
Altre attivita' formative
4
F
-
ModulesCreditsTAFSSD
12
B
ING-INF/05
6
B
ING-INF/05
6
B
ING-INF/05
12
B
ING-INF/05
activated in the A.Y. 2013/2014
ModulesCreditsTAFSSD
6
B
INF/01
Altre attivita' formative
4
F
-
Modules Credits TAF SSD
Between the years: 1°- 2°

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S02908

Credits

6

Language

English en

Scientific Disciplinary Sector (SSD)

ING-INF/05 - INFORMATION PROCESSING SYSTEMS

Period

I semestre dal Oct 1, 2013 al Jan 31, 2014.

Location

VERONA

Learning outcomes

The goal is to reach a deep comprehension and development ability in program analysis and protection. The application area concerns the development of tools for analysis an code certification, reverse engineering of code, digital forensics and code protection against theft (IPP). Particular emphasis is devoted to code protection by code obfuscation, watermarking, tamper-proofing and code attack by malware.

Program

Mathematical bases: Lattice theory and Fixpoint theory; Attack and defense: Attack, Data Flow Analysis, Static Attack, Dynamic Attack, Program Monitoring, Levels of interpretation and specialization, Code Slicing; Approximation: fix point approximation, Abstract Interpretation, Completeness, incompleteness and obfuscation; Obfuscation theory: impossibility and obfuscation via interpretation, Static Obfuscation and Dynamic Obfuscation; Tamper-proofing; Watermarking: definitions (water/birth/finger marking), Static Watermarking, Dynamic Watermarking, Abstract Watermarking; Similarity analysis, Law references and principles of digital forensics.

Examination Methods

Cooperative project in SPY-Lab on code analysis and/or protection. The exams are 4, scheduled 1 in each Session, each individual exam scheduled by appointment with the teacher.

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE