Skip to main content
UFRIM²AG : Moodle
You are currently using guest access (
Log in
)
Software Security
Home
Courses
UGA
UFRIM²AG
Master Informatique
M2 CyberSecurity
Software Security
General information
Mid-Term Assigment 2025-26
Mid-Term Assigment 2025-26
Completion requirements
Download folder
correction-MidTerm-25.pdf
ds-cysec-25.pdf
◄ Discussion forum
Jump to...
Jump to...
Discussion forum
Exercises
Corrections of the exercises
Lab1 : indications and exercices for Part 1
Lab 1 : exercises for Part 2
Source files for Lab1
Drop zone for your Lab1 report
Slides from E. Fleury
Lab 2: the subject
Lab2: the necessary files
Drop zone for your lab2 report
Correction for the exercises on information-flow and sandboxing
Lecture notes on language based security (from E. Poll)
Sandboxing (part 1) (from E. Poll)
Sandboxing (part 2) (from E. Poll)
Computer Security and the Internet: Tools and Jewels - Chapter 5 (Operating System Security and Access Control)
Exercise on Java Access Control
How to get the fuzzing tools ...
How to get the fuzzing tools ...
The files for the fuzzing lab
Some script examples to run AFL++
Files for the lab with KLEE
More about Widening and Narrowing operators
Drop Zone for Lab 3
Software Security Analysis in 2030 and Beyond: A Research Roadmap (M. BÖHME et al.)
COMPARING AI AGENTS TO CYBERSECURITY PROFESSIONALS IN REAL-WORLD PENETRATION TESTING (Justin W. Li et al, 2025)
Exercises ►