gitextract_1ipdi25s/ ├── .gitignore ├── README.md ├── anderson/ │ └── anderson-ch1.md ├── assurance/ │ └── high_assurance_lawful_intercept.md ├── attack_graphs/ │ └── attack-planning-in-the-real-world.md ├── attack_surface/ │ └── README.md ├── banking/ │ └── coinbase.md ├── classic_papers/ │ ├── confinement_problem.md │ ├── nibaldi.md │ ├── saltzer_schroeder.md │ └── thirty_years_later.md ├── mit-6858-lec-4-privilege-separation.md ├── obscurity/ │ └── techniques_for_defeating_high_strength_attackers.md ├── prisons/ │ ├── jail-design-guide-notes.md │ └── technical-guidance-on-prison-planning.md ├── saydjari/ │ ├── README.md │ ├── saydjari-ch1.md │ ├── saydjari-ch12.md │ ├── saydjari-ch16.md │ ├── saydjari-ch20.md │ └── saydjari-ch5.md ├── threat_modeling/ │ └── agile-threat-modeling.md ├── time-based-security.md └── ucb-tcb-notes.md