Skip to main content
UFRIM²AG : Moodle
You are currently using guest access (
Log in
)
Software Security
Home
Courses
UGA
UFRIM²AG
Master Informatique
M2 CyberSecurity
Software Security
September 30th [beware, course on Tuesday morning ...
Exercises
Exercises
Completion requirements
Click
td1.pdf
link to view the file.
◄ Discussion forum
Jump to...
Jump to...
Discussion forum
Corrections of the exercises
Lab1 : indications and exercices for Part 1
Lab 1 : exercises for Part 2
Source files for Lab1
Drop zone for your Lab1 report
Slides from E. Fleury
Lab 2: the subject
Lab2: the necessary files
Drop zone for your lab2 report
Correction for the exercises on information-flow and sandboxing
Lecture notes on language based security (from E. Poll)
Sandboxing (part 1) (from E. Poll)
Sandboxing (part 2) (from E. Poll)
Computer Security and the Internet: Tools and Jewels - Chapter 5 (Operating System Security and Access Control)
Exercise on Java Access Control
How to get the fuzzing tools ...
Software Security Analysis in 2030 and Beyond: A Research Roadmap (M. BÖHME et al.)
Corrections of the exercises ►