summaryrefslogtreecommitdiff
path: root/docs/m6.tex
blob: 86c88f7489051448f5b96a9540efc322dde243e0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
\input{conf}

\title{
	\begin{center}
		\includegraphics[scale=0.2]{data/unict-logo.png}
	\end{center}	
    \small\textsc{Dipartimento di Matematica e Informatica\\Corso di Internet Security}\\
    \Huge\textbf{M6: Insecure Authorization}\\
    \author{Santo Cariotti}
    \date{5 dicembre 2022}
}

\usepackage{graphicx}
\begin{document}
\maketitle

\renewcommand{\contentsname}{Indice}
\tableofcontents{}


\chapter{Introduzione}
\input{chapters/introduction}

\chapter{Possibile attacco a JWT}
\input{chapters/jwt-attacks}

\chapter{Set up}
\input{chapters/setup}

\chapter{Traffico di rete}
\input{chapters/network}

\chapter{Conclusione}
\input{chapters/conclusion}

\bibliography{refs}
\bibliographystyle{ieeetr}

\end{document}