Skip to main content
UFRIM²AG : Moodle
You are currently using guest access (
Log in
)
Software Security
Home
Courses
UGA
UFRIM²AG
Master Informatique
M2 CyberSecurity
Software Security
September 30th [beware, course on Tuesday morning ...
Exercises
Exercises
Completion requirements
Click
td1.pdf
link to view the file.
◄ Mid-Term Assigment 2025-26
Jump to...
Jump to...
Discussion forum
Mid-Term Assigment 2025-26
Corrections of the exercises
Lab1 : indications and exercices for Part 1
Lab 1 : exercises for Part 2
Source files for Lab1
Drop zone for your Lab1 report
Slides from E. Fleury
Lab 2: the subject
Lab2: the necessary files
Drop zone for your lab2 report
Correction for the exercises on information-flow and sandboxing
Lecture notes on language based security (from E. Poll)
Sandboxing (part 1) (from E. Poll)
Sandboxing (part 2) (from E. Poll)
Computer Security and the Internet: Tools and Jewels - Chapter 5 (Operating System Security and Access Control)
Exercise on Java Access Control
How to get the fuzzing tools ...
How to get the fuzzing tools ...
The files for the fuzzing lab
Some script examples to run AFL++
Files for the lab with KLEE
More about Widening and Narrowing operators
Drop Zone for Lab 3
Software Security Analysis in 2030 and Beyond: A Research Roadmap (M. BÖHME et al.)
COMPARING AI AGENTS TO CYBERSECURITY PROFESSIONALS IN REAL-WORLD PENETRATION TESTING (Justin W. Li et al, 2025)
Corrections of the exercises ►