New attack methods and their implementation

Summary
A document describing method/algorithms on the potential attacks for the system, and their software implementation