try {
_WidgetManager._HandleControllerResult('BlogArchive1', 'getTitles',{'path': 'https://googleprojectzero.blogspot.com/2015', 'posts': [{'title': 'FireEye Exploitation: Project Zero\u2019s Vulnerability...', 'url': 'https://googleprojectzero.blogspot.com/2015/12/fireeye-exploitation-project-zeros.html'}, {'title': 'Between a Rock and a Hard Link', 'url': 'https://googleprojectzero.blogspot.com/2015/12/between-rock-and-hard-link.html'}, {'title': 'Windows Sandbox Attack Surface Analysis', 'url': 'https://googleprojectzero.blogspot.com/2015/11/windows-sandbox-attack-surface-analysis.html'}, {'title': 'Hack The Galaxy: Hunting Bugs in the Samsung Galax...', 'url': 'https://googleprojectzero.blogspot.com/2015/11/hack-galaxy-hunting-bugs-in-samsung.html'}, {'title': 'Windows Drivers are True\u2019ly Tricky', 'url': 'https://googleprojectzero.blogspot.com/2015/10/windows-drivers-are-truely-tricky.html'}, {'title': 'Revisiting Apple IPC: (1) Distributed Objects', 'url': 'https://googleprojectzero.blogspot.com/2015/09/revisiting-apple-ipc-1-distributed_28.html'}, {'title': 'Kaspersky: Mo Unpackers, Mo Problems.', 'url': 'https://googleprojectzero.blogspot.com/2015/09/kaspersky-mo-unpackers-mo-problems.html'}, {'title': 'Stagefrightened?', 'url': 'https://googleprojectzero.blogspot.com/2015/09/stagefrightened.html'}, {'title': 'Enabling QR codes in Internet Explorer, or a story...', 'url': 'https://googleprojectzero.blogspot.com/2015/09/enabling-qr-codes-in-internet-explorer.html'}, {'title': 'Windows 10^H^H Symbolic Link Mitigations', 'url': 'https://googleprojectzero.blogspot.com/2015/08/windows-10hh-symbolic-link-mitigations.html'}, {'title': 'One font vulnerability to rule them all #4: Window...', 'url': 'https://googleprojectzero.blogspot.com/2015/08/one-font-vulnerability-to-rule-them-all_21.html'}, {'title': 'Three bypasses and a fix for one of Flash\x26#39;s Vector...', 'url': 'https://googleprojectzero.blogspot.com/2015/08/three-bypasses-and-fix-for-one-of.html'}, {'title': 'Attacking ECMAScript Engines with Redefinition', 'url': 'https://googleprojectzero.blogspot.com/2015/08/attacking-ecmascript-engines-with.html'}, {'title': 'One font vulnerability to rule them all #3: Window...', 'url': 'https://googleprojectzero.blogspot.com/2015/08/one-font-vulnerability-to-rule-them-all_13.html'}, {'title': 'One font vulnerability to rule them all #2: Adobe ...', 'url': 'https://googleprojectzero.blogspot.com/2015/08/one-font-vulnerability-to-rule-them-all.html'}, {'title': 'One font vulnerability to rule them all #1: Introd...', 'url': 'https://googleprojectzero.blogspot.com/2015/07/one-font-vulnerability-to-rule-them-all.html'}, {'title': 'One Perfect Bug: Exploiting Type Confusion in Flash', 'url': 'https://googleprojectzero.blogspot.com/2015/07/one-perfect-bug-exploiting-type_20.html'}, {'title': 'Significant Flash exploit mitigations are live in ...', 'url': 'https://googleprojectzero.blogspot.com/2015/07/significant-flash-exploit-mitigations_16.html'}, {'title': 'From inter to intra: gaining reliability', 'url': 'https://googleprojectzero.blogspot.com/2015/07/from-inter-to-intra-gaining-reliability_10.html'}, {'title': 'When \u2018int\u2019 is the new \u2018short\u2019', 'url': 'https://googleprojectzero.blogspot.com/2015/07/when-int-is-new-short.html'}, {'title': 'What is a \x26quot;good\x26quot; memory corruption vulnerability?', 'url': 'https://googleprojectzero.blogspot.com/2015/06/what-is-good-memory-corruption.html'}, {'title': 'Analysis and Exploitation of an ESET Vulnerability', 'url': 'https://googleprojectzero.blogspot.com/2015/06/analysis-and-exploitation-of-eset.html'}, {'title': 'Owning Internet Printing - A Case Study in Modern ...', 'url': 'https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html'}, {'title': 'Dude, where\u2019s my heap?', 'url': 'https://googleprojectzero.blogspot.com/2015/06/dude-wheres-my-heap.html'}, {'title': 'In-Console-Able', 'url': 'https://googleprojectzero.blogspot.com/2015/05/in-console-able.html'}, {'title': 'A Tale of Two Exploits', 'url': 'https://googleprojectzero.blogspot.com/2015/04/a-tale-of-two-exploits.html'}, {'title': 'Taming the wild copy: Parallel Thread Corruption', 'url': 'https://googleprojectzero.blogspot.com/2015/03/taming-wild-copy-parallel-thread.html'}, {'title': 'Exploiting the DRAM rowhammer bug to gain kernel p...', 'url': 'https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html'}, {'title': 'Feedback and data-driven updates to Google\u2019s discl...', 'url': 'https://googleprojectzero.blogspot.com/2015/02/feedback-and-data-driven-updates-to.html'}, {'title': '(^Exploiting)\\s*(CVE-2015-0318)\\s*(in)\\s*(Flash$)', 'url': 'https://googleprojectzero.blogspot.com/2015/02/exploitingscve-2015-0318sinsflash.html'}, {'title': 'A Token\u2019s Tale', 'url': 'https://googleprojectzero.blogspot.com/2015/02/a-tokens-tale_9.html'}, {'title': 'Exploiting NVMAP to escape the Chrome sandbox - CV...', 'url': 'https://googleprojectzero.blogspot.com/2015/01/exploiting-nvmap-to-escape-chrome.html'}, {'title': 'Finding and exploiting ntpd vulnerabilities', 'url': 'https://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html'}]});
} catch (e) {
  if (typeof log != 'undefined') {
    log('HandleControllerResult failed: ' + e);
  }
}
