You are on page 1of 5
SHAHANI ENGINEERING COLLEGE Computer Engineering Department THADOMAL Branch; List of Experiments Subject: SPCC Name ‘Computer Sen vy | 1. | Write program to implement Lexical Analyzer Write @ program to eliminate left recursion from the given grammar 2, | To study and implement programs LEX and YACC tool cos a Cor __ | Write a program to implement the FIRST and FOLLOW set for the 3+ | given grammar 4, | Write a program to implement Parser C03 5. | Write @ program to implement Three Address Code (TAC) cos 6. | Writea program to implement Code Optimization cos 7, |) Write program to implement Pas 1 of Malt-Pass Assembler a | b) Write a program to implement Pass 2 of Multi-Pass Assembler ‘Write a program to implement Multi Pass Macroprocessor con ‘Additional Experiments Write a program to implement Code Generation co4 Cos Subject Incharge. sapowns shai sweeten COLLEGE BANORAID erat Arica thellze Sect Inbar Dr, Shilpa Vetba = | This or Experiment No) obte Fouation wid PEAS pres =f DAD seta ibe |=} implica GCS seach leon Ta Python z -TipfeniA® sewchalgorcin im PyThOH Set SmaTeH Aan g1Genete Hic Amblie (ay ane) iH Python Sa or Wapas World Preklirm | ce epee World Probiew + | Planning forztectos probes (ex, Bio GS Staiy on existing AT eect — Resigament on Hasiox oFATUoalItlligene 8) Various erations of AL | 1) Components of AL 5} Categorization of AL [Ford ana Backward chaining 2023 Jan Ape Vid THADOMAL SHAHANI ENGINEERING COLLEGE Department of Computer Engineering Academic Year 2022-23 T. E, Computer Semester: VI List of Experiments (Date : 9/01/2023 t: Cryptography and System Security Lab, (CSS Lab.) Subj No. Name of Experiments Implementation of Extended Euclidean algorithm Imptementation 0 Caesar Cipher plementatio Playfair 4. | Implementation of Euler's Totient Fu 5. | mp mentation of RSA crypiosystem 6. | Implementation of Diffie Hellman Key exchange algocithm | SIGRY the use of network reconnaissance tools and apply the Following: WHOIS, dig, meson 7 8. | Study and implementation of packets fer tool: wireshark [Desig Ipables n of personal Firewall usi 9 (0|Simulation of Buffer Overflow Attack LSimulation of SQL Injeetion At k [Optional] 12| Simulation of port scanning attack using Nmap [Optional] Written Assignment Assignment 1: A Explain diffe services and mechanisms of security?” 1B what are various types of attacks? Explain with example C list few Latest viruses on net and explain (out of syllabus, take print) Assignment 2 : Write short note on digital signatures and digital ceriicates Assignment 3: List software vulnerabilities, How are they exploited to launch an at ack? Subject Te-charge / Dr. Atti Deshpande

You might also like