Skip to main content
UFRIM²AG : Moodle
You are currently using guest access (
Log in
)
Software Security
Home
Courses
UGA
UFRIM²AG
Master Informatique
M2 CyberSecurity
Software Security
November 5th
Lecture notes on language based security (from E. ...
Lecture notes on language based security (from E. Poll)
Completion requirements
Click
language_based_security.pdf
link to view the file.
◄ Correction for the exercises on information-flow and sandboxing
Jump to...
Jump to...
Discussion forum
Mid-Term Assigment 2025-26
Exercises
Corrections of the exercises
Lab1 : indications and exercices for Part 1
Lab 1 : exercises for Part 2
Source files for Lab1
Drop zone for your Lab1 report
Slides from E. Fleury
Lab 2: the subject
Lab2: the necessary files
Drop zone for your lab2 report
Correction for the exercises on information-flow and sandboxing
Sandboxing (part 1) (from E. Poll)
Sandboxing (part 2) (from E. Poll)
Computer Security and the Internet: Tools and Jewels - Chapter 5 (Operating System Security and Access Control)
Exercise on Java Access Control
How to get the fuzzing tools ...
How to get the fuzzing tools ...
The files for the fuzzing lab
Some script examples to run AFL++
Files for the lab with KLEE
More about Widening and Narrowing operators
Drop Zone for Lab 3
Software Security Analysis in 2030 and Beyond: A Research Roadmap (M. BÖHME et al.)
COMPARING AI AGENTS TO CYBERSECURITY PROFESSIONALS IN REAL-WORLD PENETRATION TESTING (Justin W. Li et al, 2025)
Sandboxing (part 1) (from E. Poll) ►