Solves
| Challenge | Category | Value | Time |
| Math | mitigations | 100 | |
| Power | other | 100 | |
| Slice Reversing | cache attacks II | 100 | |
| Covert Channel | cache attacks I | 100 | |
| Debug Interface | microarchitecture | 100 | |
| Remote Timing | timing | 100 | |
| PIN | introduction | 100 |
| Challenge | Category | Value | Time |
| Math | mitigations | 100 | |
| Power | other | 100 | |
| Slice Reversing | cache attacks II | 100 | |
| Covert Channel | cache attacks I | 100 | |
| Debug Interface | microarchitecture | 100 | |
| Remote Timing | timing | 100 | |
| PIN | introduction | 100 |