1. | Introduction | view | more | |
2. | Landscape | view | more | |
3. | Memory Corruption | view | more | |
4. | MC: Stacks & Heaps | view | more | |
5. | MC: Countermeasures | view | more | |
6. | CWEs, Injection | view | more | |
7. | SQL Injection | view | more | |
8. | Race Conditions | view | more | |
9. | Development | view | more | |
10. | Web I (authentication) | view | more | |
11. | Web II (urls,xss,authr’n) | view | more | |
12. | Web Apps III (leakage +) | view | more | |
13. | Static Analysis | view | more | |
14. | Static Analysis II | view | more | |
15. | Information Leakage | view | more | |
16. | Android Malware | view | more | |
17. | Software Protection | view | more |
Informatics Forum, 10 Crichton Street, Edinburgh, EH8 9AB, Scotland, UK
Tel: +44 131 651 5661, Fax: +44 131 651 1426, E-mail: school-office@inf.ed.ac.uk Please contact our webadmin with any comments or corrections. Logging and Cookies Unless explicitly stated otherwise, all material is copyright © The University of Edinburgh |