{"version":"1.0","type":"video","provider_name":"media.ccc.de","provider_url":"https://media.ccc.de","width":400,"height":300,"title":"Automated Exploit Detection in Binaries","author":"Luis Miras","thumbnail_url":"https://static.media.ccc.de/media/congress/2006/23C3-1694-en-automated_exploit_detection_in_binaries.jpg","html":"\u003ciframe src=\"https://media.ccc.de/v/23C3-1694-en-automated_exploit_detection_in_binaries/oembed\" width=\"400\" height=\"300\" frameborder=\"0\" title=\"Automated Exploit Detection in Binaries\" allowfullscreen scrolling=\"no\"\u003e\u003c/iframe\u003e\n"}