Skip to main content
UFRIM²AG : Moodle
You are currently using guest access (
Log in
)
Software Security
Home
Courses
UGA
UFRIM²AG
Master Informatique
M2 CyberSecurity
Software Security
November 5th
Correction for the exercises on information-flow a...
Correction for the exercises on information-flow and sandboxing
Completion requirements
Click
TD-NI-AccessControl-SOLUTIONS.pdf
link to view the file.
◄ Drop zone for your lab2 report
Jump to...
Jump to...
Discussion forum
Exercises
Corrections of the exercises
Lab1 : indications and exercices for Part 1
Lab 1 : exercises for Part 2
Source files for Lab1
Drop zone for your Lab1 report
Slides from E. Fleury
Lab 2: the subject
Lab2: the necessary files
Drop zone for your lab2 report
Lecture notes on language based security (from E. Poll)
Sandboxing (part 1) (from E. Poll)
Sandboxing (part 2) (from E. Poll)
Computer Security and the Internet: Tools and Jewels - Chapter 5 (Operating System Security and Access Control)
Exercise on Java Access Control
How to get the fuzzing tools ...
Software Security Analysis in 2030 and Beyond: A Research Roadmap (M. BÖHME et al.)
Lecture notes on language based security (from E. Poll) ►