Exploiting and Mitigating Advanced Security Vulnerabilities