Hands-on Tutorial: How Exploitable is Insecure C Code? | IEEE Conference Publication | IEEE Xplore