It’s fascinating that already had a system which could identify the exploit at runtime. How can I learn more about that?