['Advanced Binary Emulation framework.pdf', 'CiscoASA:From Zero to ID=0.pdf', 'crauEmu - your IDE for code-reuse attacks.pdf', 'Dark sides of Java remote protocols.pdf', 'Electron,scheme handlers and stealthy security patches.pdf', 'Fatal Fury on ESP32:Time to release Hardware Exploits.pdf', 'Hacking Medical Imaging with DICOM.pdf', 'I PWN thee,I PWN thee not! .pdf', 'Launching feedback-driven fuzzing on TrustZone TEE.pdf', 'Malign Machine Learning Models.pdf', 'Oldschool way of hacking MicroDigital ip-cameras.pdf', 'Practical LoRaWAN auditing and exploitation.pdf', 'Single byte write to RCE:exploiting a bug in php-fpm.pdf', 'Trusted Types & the end of DOM XSS.pdf', 'Two Bytes to Rule Adobe Reader Twice:The Black Magic Behind the Byte Order Mark.pdf']