Summary
A document describing method/algorithms on the potential attacks for the system, and their software implementation
More information & hyperlinks