2DMI20 - Software Security

.
├── notes
│   ├── Lecture 01.pdf
│   ├── Lecture 02.pdf
│   ├── Lecture 03.pdf
│   ├── Lecture 04.pdf
│   ├── Lecture 05.pdf
│   ├── Lecture 06.pdf
│   ├── Lecture 07.pdf
│   ├── Lecture 08.pdf
│   ├── Lecture 09.pdf
│   ├── Lecture 10.pdf
│   ├── Lecture 11.pdf
│   ├── Lecture 12.pdf
│   └── Lecture 13.pdf
├── practical_tasks
│   ├── set1
│   │   ├── 01_Practical exercise password checker.pdf
│   │   ├── 02_ExerciseFxMeasure.pdf
│   │   ├── 03_Exercise CFG + reaching definitions analysis.pdf
│   │   └── 04_Exercise very busy expressions.pdf
│   └── set2
│       ├── 01_rsa.pdf
│       ├── 02_rsa_crt.pdf
│       ├── 03_rsa_crt_fault_injection.pdf
│       └── 04_schnorr.pdf
└── Summary.pdf


4 directories, 22 files


tree v1.7.0 © 1996 - 2014 by Steve Baker and Thomas Moore
HTML output hacked and copyleft © 1998 by Francesc Rocher
JSON output hacked and copyleft © 2014 by Florian Sesser
Charsets / OS/2 support © 2001 by Kyosuke Tokoro