Tutorial: Investigating Advanced Exploits for System Security Assurance | IEEE Conference Publication | IEEE Xplore