Access Keys:
Skip to content (Access Key - 0)


Lecture: 12:30-1:45pm 0222 SC

Office hours: See Information page.

Class Overview

This class covers the practical techniques to capture and investigate malicious code. It is expected that students have a very strong grasp of networking, operating systems and computer architecture so they can understand the analysis techniques.

Student Collaboration Area

Use the Student Writable page to create information to be shared with other members of the class. This information is not readable to the anonymous viewer. Login first to get here. Information about registering your IP addresses for experiments is in this area.

Related Courses

Look at the Security Course Roadmap for an understanding of the broader set of security courses and seminars offered at Illinois.

Academic Honesty

Copying or allowing someone to copy homework solutions, machine problems, and exam solutions, from other students in the class, or from other sources is considered plagiarism and is treated very seriously by the Department of Computer Science. The usual penalty for a first cheating offense is a grade of zero on the homework or exam. The penalty for a second offense, or a particularly severe first offense, is an F in the course. All cheating cases are reported to the department. Multiple offenses can result in suspension or dismissal from CS program or from the university. Please refer to the University Policy on Academic Integrity and the CS Department's Honor Code

Recently Updated

Navigate space
Adaptavist Theme Builder (4.2.2) Powered by Atlassian Confluence 3.4.9, the Enterprise Wiki