CS 410 Southern New HU Binary to C++ With Security Vulnerabilities Activity
6/10/2021Binary to C++ With Security Vulnerabilities Activity Guidelines and Rubric – CS-410-T5470 Software Reverse Engineering 21EW5
CS-410-T5470 Software Reverse Engineering 21EW5
Binary to C++ With Security Vulnerabilities Activity
Guidelines and Rubric
Overview
In previous activities, you converted files using languages including binary, assembly, and C++. You have successfully completed a
full conversion of legacy code, from binary to C++. In this activity, you will convert legacy binary code to C++, examine the code for
security vulnerabilities, fix the identified security vulnerabilities, and report on those vulnerabilities. This is a key step toward the
successful completion of Project Two, which is centered on fixing security vulnerabilities. The coding for this assignment will be
performed in Codio. You will submit the completed Binary to C++ With Security Vulnerabilities Activity Template and a new binary
file and CPP file.
Prompt
Specifically, you must address the following rubric criteria:
1. Convert the binary file to assembly code.
These files can be found in the Software Reverse Engineering Playground in the Module Six file folder in Codio.
2. Explain the functionality of the blocks of assembly code.
Use the Binary to C++ With Security Vulnerabilities Activity Template to complete this step.
3. Convert the assembly code to binary.
Create a new binary file for submission.
4. Convert the assembly code to C++ code.
Use the Binary to C++ With Security Vulnerabilities Activity Template to complete this step.
Compile the C++ code in the Eclipse integrated development environment.
5. Identify the security vulnerabilities within the C++ code.
Comment within the C++ code to indicate where the security vulnerabilities are identified.
6. Fix the identified security vulnerabilities within the C++ code.
Correct the C++ code to fix the security vulnerabilities.
7. Explain how the updated C++ code fixes the identified vulnerabilities.
Comment within the C++ code to indicate how the security vulnerabilities were fixed.
Guidelines for Submission
Binary to C++ With Security Vulnerabilities Activity Template
This should be a Word document. Use the Binary to C++ With Security Vulnerabilities Activity Template to convert the legacy binary
file into assembly, explain the functionality of the assembly code, and convert the assembly code to C++ code.
C++ File
This file includes your comments on the identified security vulnerabilities, the fixes, and the comments about how the security
vulnerabilities were fixed. This file is needed to ensure that the code, identified vulnerabilities, fixes, and comments are correct.
Binary File
This file is needed to run the application.
https://learn.snhu.edu/d2l/le/content/752871/viewContent/12896103/View
1/5
6/10/2021
Binary to C++ With Security Vulnerabilities Activity Guidelines and Rubric – CS-410-T5470 Software Reverse Engineering 21EW5
Binary to C++ With Security Vulnerabilities Activity Rubric
Criteria
Binary to
Exemplary
N/A
Assembly
Conversion
Proficient
Needs Improvement
Not Evident
Converts binary file
Shows progress
Does not attempt
into assembly code
toward proficiency,
criterion (0%)
(100%)
but with errors or
omissions; areas for
Value
9
improvement may
include converting
the binary file into
assembly code (85%)
Assembly
Exceeds proficiency
Explains the
Shows progress
Does not attempt
Functionality
in an exceptionally
functionality of the
toward proficiency,
criterion (0%)
clear, insightful,
sophisticated, or
blocks of assembly
code with minimal
but with errors or
omissions; areas for
creative manner
errors and adequate
improvement may
(100%)
detail (85%)
include explaining
13
the functionality of
the blocks of
assembly code with
minimal errors and
richer detail (55%)
Assembly to
Binary Conversion
N/A
Converts the
assembly code to
Shows progress
toward proficiency,
binary (100%)
but with errors or
Does not attempt
criterion (0%)
9
omissions; areas for
improvement may
include converting
the assembly code to
binary (85%)
Assembly to C++
Conversion
Exceeds proficiency
in an exceptionally
clear, insightful,
sophisticated, or
creative manner
(100%)
Converts each block
of assembly code to
C++ code with
minimal errors (85%)
Shows progress
toward proficiency,
but with errors or
omissions; areas for
improvement may
include converting
each block of
assembly code to
C++ code with fewer
errors (55%)
Does not attempt
criterion (0%)
10
Identify Security
Vulnerabilities
Exceeds proficiency
in an exceptionally
clear, insightful,
sophisticated, or
creative manner
(100%)
Identifies all of the
security
vulnerabilities within
the C++ code with
minimal errors (85%)
Shows progress
toward proficiency,
but with errors or
omissions; areas for
improvement may
include identifying all
of the security
vulnerabilities within
the C++ code with
fewer errors (55%)
Does not attempt
criterion (0%)
18
https://learn.snhu.edu/d2l/le/content/752871/viewContent/12896103/View
2/5
6/10/2021
Binary to C++ With Security Vulnerabilities Activity Guidelines and Rubric – CS-410-T5470 Software Reverse Engineering 21EW5
fewer errors (55%)
Fix Security
Exceeds proficiency
Fixes the identified
Shows progress
Does not attempt
Vulnerabilities
in an exceptionally
security
toward proficiency,
criterion (0%)
clear, insightful,
vulnerabilities within
but with errors or
sophisticated, or
the C++ code with
omissions; areas for
creative manner
minimal errors (85%)
improvement may
(100%)
18
include fixing the
identified security
vulnerabilities within
the C++ code with
fewer errors (55%)
Security
Vulnerabilities
Explanation
Exceeds proficiency
in an exceptionally
Explains how the
updated C++ code
Shows progress
toward proficiency,
clear, insightful,
fixes the identified
but with errors or
sophisticated, or
security
omissions; areas for
creative manner
vulnerabilities with
improvement may
(100%)
minimal errors (85%)
include explaining
Does not attempt
criterion (0%)
18
5
how the updated
C++ code fixes the
identified security
vulnerabilities with
fewer errors (55%)
Articulation of
Response
Exceeds proficiency
in an exceptionally
Clearly conveys
meaning with correct
Shows progress
toward proficiency,
Submission has
critical errors in
clear, insightful,
grammar, sentence
but with errors in
grammar, sentence
sophisticated, or
structure, and
grammar, sentence
structure, and
creative manner
spelling,
structure, and
spelling, preventing
demonstrating an
spelling, negatively
understanding of
understanding of
impacting readability
ideas
audience and
purpose
Total:
https://learn.snhu.edu/d2l/le/content/752871/viewContent/12896103/View
100%
3/5
6/10/2021
Binary to C++ With Security Vulnerabilities Activity Guidelines and Rubric – CS-410-T5470 Software Reverse Engineering 21EW5
Reflect in ePortfolio
Download
Print
Open with docReader
https://learn.snhu.edu/d2l/le/content/752871/viewContent/12896103/View
4/5
6/10/2021
Binary to C++ With Security Vulnerabilities Activity Guidelines and Rubric – CS-410-T5470 Software Reverse Engineering 21EW5
Activity Details
You have viewed this topic
Last Visited Jun 10, 2021 6:54 PM
https://learn.snhu.edu/d2l/le/content/752871/viewContent/12896103/View
5/5
CS 410 Binary to C++ With Security Vulnerabilities Activity Template
Step 1: Convert the binary file to assembly code.
Step 2: Explain the functionality of the blocks of assembly code.
Blocks of Assembly Code
Explanation of Functionality
Step 3: Convert the assembly code to binary.
Step 4: Convert the assembly code to C++ code.
Blocks of Assembly Code
C++ Code
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics