This shows you the differences between two versions of the page.
cns:labs:lab-12 [2018/01/08 21:00] elena.sandulescu [Lab Support Files] |
cns:labs:lab-12 [2019/12/08 15:18] (current) dennis.plosceanu |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Lab 12 - Integers ====== | + | ====== Extra - Integers ====== |
===== Resources ===== | ===== Resources ===== | ||
Line 28: | Line 28: | ||
1-overflow/ 2-comparison/ 3-sts7/ 4-sts2/ 5-sts2_alt/ | 1-overflow/ 2-comparison/ 3-sts7/ 4-sts2/ 5-sts2_alt/ | ||
</code> | </code> | ||
+ | |||
+ | ===== 0. Feedback ===== | ||
+ | |||
+ | In order to improve the Computer Network Security course, your opinions and suggestions are important to us. The feedback is anonymous and the results will only become visible after the final exam. You will find the link to the feedback form on the main page of the curs.pub.ro instance for your master's program CNS class (either PDCS or SRIC). It's **not** in the meta-course for all students. | ||
===== Introduction ===== | ===== Introduction ===== | ||
Line 86: | Line 90: | ||
===== 2. [2.5p] Signed/unsigned comparison ===== | ===== 2. [2.5p] Signed/unsigned comparison ===== | ||
- | For our first task, let's investigate how comparison between signed and unsigned values results in unwelcomed program behavior. | + | For our second task, let's investigate how comparison between signed and unsigned values results in unwelcomed program behavior. |
Please access the ''2-comparison/'' subfolder in the lab archive. It consists of three files: a ''Makefile'', a C source code file dubbed ''comparison.c'' and the resulting executable (ELF) file on a 32-bit system ''comparison''. | Please access the ''2-comparison/'' subfolder in the lab archive. It consists of three files: a ''Makefile'', a C source code file dubbed ''comparison.c'' and the resulting executable (ELF) file on a 32-bit system ''comparison''. |