1. Introduction
2. Binary Exploitation (Stack, Buffer Overflows, Return-to-LibC, W^X Canaries, ROP Attacks, ASLR)
3. More Exploitation (Buffer Overheads, Format String, Integer Vulnerabilities, Heap Exploits)
4. Access Control (Access Control Matrix, Capabilities, Bell-LaPadua, Biba, Covert Channels)
5. Confinement (Airgaps, VMs, Containers, OKWS, Software Fault Isolation, Native Client)
6. Trusted Execution Environments (ARM Trustzone, Intel SGX)
7. Micro-Architectural Attacks (Cache Timing, Prime+Probe, Meltdown, Spectre)
8. Hardware Security (Hardware Trojans, Logic Locking, Power Analysis Attacks)