['Attacking Hyper-V.pdf', 'Bug Hunting in Synology NAS.pdf', 'Checking Defects in Deep Learning AI Models.pdf', 'Chrome Exploitation.pdf', 'Exploiting IOSurface 0.pdf', 'How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 and earlier.pdf', 'Inside Hidden Cobra Cyber Offensive Programs.pdf', 'KNOX Kernel Mitigation Bypasses %28New Reliable Android Kernel Root Exploitation Part %232%29.pdf', 'Machine learning implementation security in the wild.pdf', 'Reimplementing Local RPC in .NET.pdf', 'Revery:from POC to EXP.pdf', 'Safari Adventure:A Dive into Apple Browser Internals.pdf', 'The One Weird Trick SecureROM Hates.pdf', 'Threat From The Satellite.pdf', 'Using Fault Injection for Turning Data Transfers into Arbitrary Execution.pdf']