try {
_WidgetManager._HandleControllerResult('BlogArchive1', 'getTitles',{'path': 'https://googleprojectzero.blogspot.com/2017', 'posts': [{'title': 'aPAColypse now: Exploiting Windows 10 in a Local N...', 'url': 'https://googleprojectzero.blogspot.com/2017/12/apacolypse-now-exploiting-windows-10-in_18.html'}, {'title': 'Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi...', 'url': 'https://googleprojectzero.blogspot.com/2017/10/over-air-vol-2-pt-3-exploiting-wi-fi.html'}, {'title': 'Using Binary Diffing to Discover Windows Kernel Me...', 'url': 'https://googleprojectzero.blogspot.com/2017/10/using-binary-diffing-to-discover.html'}, {'title': 'Over The Air - Vol. 2, Pt. 2: Exploiting The Wi-Fi...', 'url': 'https://googleprojectzero.blogspot.com/2017/10/over-air-vol-2-pt-2-exploiting-wi-fi.html'}, {'title': 'Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi...', 'url': 'https://googleprojectzero.blogspot.com/2017/09/over-air-vol-2-pt-1-exploiting-wi-fi.html'}, {'title': 'The Great DOM Fuzz-off of 2017', 'url': 'https://googleprojectzero.blogspot.com/2017/09/the-great-dom-fuzz-off-of-2017.html'}, {'title': 'Bypassing VirtualBox Process Hardening on Windows', 'url': 'https://googleprojectzero.blogspot.com/2017/08/bypassing-virtualbox-process-hardening.html'}, {'title': 'Windows Exploitation Tricks: Arbitrary Directory C...', 'url': 'https://googleprojectzero.blogspot.com/2017/08/windows-exploitation-tricks-arbitrary.html'}, {'title': 'Trust Issues: Exploiting TrustZone TEEs', 'url': 'https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html'}, {'title': 'Exploiting the Linux kernel via packet sockets', 'url': 'https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html'}, {'title': 'Exploiting .NET Managed DCOM', 'url': 'https://googleprojectzero.blogspot.com/2017/04/exploiting-net-managed-dcom.html'}, {'title': 'Exception-oriented exploitation on iOS', 'url': 'https://googleprojectzero.blogspot.com/2017/04/exception-oriented-exploitation-on-ios.html'}, {'title': 'Over The Air: Exploiting Broadcom\u2019s Wi-Fi Stack (P...', 'url': 'https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html'}, {'title': 'Notes on Windows Uniscribe Fuzzing', 'url': 'https://googleprojectzero.blogspot.com/2017/04/notes-on-windows-uniscribe-fuzzing.html'}, {'title': 'Pandavirtualization: Exploiting the Xen hypervisor', 'url': 'https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html'}, {'title': 'Over The Air: Exploiting Broadcom\u2019s Wi-Fi Stack (P...', 'url': 'https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html'}, {'title': 'Project Zero Prize Conclusion', 'url': 'https://googleprojectzero.blogspot.com/2017/03/project-zero-prize-conclusion.html'}, {'title': 'Attacking the Windows NVIDIA Driver', 'url': 'https://googleprojectzero.blogspot.com/2017/02/attacking-windows-nvidia-driver.html'}, {'title': 'Lifting the (Hyper) Visor: Bypassing Samsung\u2019s Rea...', 'url': 'https://googleprojectzero.blogspot.com/2017/02/lifting-hyper-visor-bypassing-samsungs.html'}]});
} catch (e) {
  if (typeof log != 'undefined') {
    log('HandleControllerResult failed: ' + e);
  }
}
