Malware Reverse Engineering presented at AUScert 2007

by Andrew Collins, Mark Titley, Sarah Tueno,

Summary : Unknowingly placing malicious code into your ICT environment can pose a significant security risk. This tutorial aims to walk students through the process of reverse engineering potentially malicious code/applications. With this knowledge in hand a system administrator will be able to identify potential risks in non-commercial software prior to it being deployed into a business-critical production environment.