<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-9.0.2'-->
<?xml-stylesheet type="text/xsl" href="//blog.trailofbits.com/image-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.trailofbits.com/2muchrock41hand/</loc><lastmod>2008-05-09T02:15:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2008/05/2muchrock41hand.jpg</image:loc><image:title>Too much rock for one hand</image:title><image:caption>Photo by Divide, 2007</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/machackerscover/</loc><lastmod>2009-02-22T22:17:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2009/02/machackerscover.jpg</image:loc><image:title>machackerscover</image:title><image:caption>The Mac Hacker's Handbook</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2012/10/29/ending-the-love-affair-with-exploitshield/</loc><lastmod>2012-10-24T23:31:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2012/10/es-1.png</image:loc><image:title>ES-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/codecomparison/</loc><lastmod>2013-01-25T00:40:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2013/01/codecomparison.png</image:loc><image:title>codecomparison</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/bug1/</loc><lastmod>2014-04-27T15:42:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/04/bug1.png</image:loc><image:title>bug1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/bug2/</loc><lastmod>2014-04-27T15:42:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/04/bug2.png</image:loc><image:title>bug2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/06/03/dear-darpa-challenge-accepted/</loc><lastmod>2014-06-03T22:35:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/06/cgc_stacked_coloronblack.jpg</image:loc><image:title>CGC_Stacked_ColoronBlack</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/</loc><lastmod>2014-06-19T22:40:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/06/ida_timespi_original.png</image:loc><image:title>IDA_TimesPi_Original</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/</loc><lastmod>2014-06-19T22:40:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/06/figure_8_2.png</image:loc><image:title>figure_8_2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/</loc><lastmod>2014-06-19T22:40:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/06/ida_timespi_lifted.png</image:loc><image:title>IDA_TimesPi_Lifted</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/10487588_588177764633699_1497332133553342074_n/</loc><lastmod>2014-07-26T00:22:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/07/10487588_588177764633699_1497332133553342074_n.jpg</image:loc><image:title>10487588_588177764633699_1497332133553342074_n</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/07/30/education-initiative-spotlight-build-it-break-it/</loc><lastmod>2014-07-27T20:28:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/07/buildit_breakit.png</image:loc><image:title>buildit_breakit</image:title><image:caption>Built it Break it is a first-of-its-kind security challenge run by UMD</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/</loc><lastmod>2014-08-19T17:20:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/08/image00.png</image:loc><image:title>image00</image:title><image:caption>adsf</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/</loc><lastmod>2014-08-19T17:19:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/08/image01.png</image:loc><image:title>image01</image:title><image:caption>asdfasdf</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/1/</loc><lastmod>2014-09-01T23:21:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/1.jpeg</image:loc><image:title>AppleID Login Page</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/1_edit/</loc><lastmod>2014-09-01T23:24:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/1_edit.png</image:loc><image:title>1_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2_edit/</loc><lastmod>2014-09-01T23:27:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/2_edit.png</image:loc><image:title>2_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/3_edit/</loc><lastmod>2014-09-01T23:29:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/3_edit.png</image:loc><image:title>3_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/4_edit/</loc><lastmod>2014-09-01T23:29:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/4_edit.png</image:loc><image:title>4_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/5_edit/</loc><lastmod>2014-09-01T23:30:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/5_edit.png</image:loc><image:title>5_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/6_edit/</loc><lastmod>2014-09-01T23:31:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/6_edit.png</image:loc><image:title>6_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/7_edit/</loc><lastmod>2014-09-01T23:33:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/7_edit.png</image:loc><image:title>7_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/9_edit/</loc><lastmod>2014-09-01T23:39:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/9_edit.png</image:loc><image:title>9_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/8_edit/</loc><lastmod>2014-09-01T23:39:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/8_edit.jpg</image:loc><image:title>8_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/10_edit/</loc><lastmod>2014-09-01T23:40:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/10_edit.png</image:loc><image:title>10_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/11_edit/</loc><lastmod>2014-09-01T23:43:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/11_edit.png</image:loc><image:title>11_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/12_edit/</loc><lastmod>2014-09-01T23:45:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/12_edit.png</image:loc><image:title>12_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/13_edit/</loc><lastmod>2014-09-01T23:48:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/13_edit.png</image:loc><image:title>13_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/14_edit/</loc><lastmod>2014-09-01T23:48:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/14_edit.png</image:loc><image:title>14_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/1_edit-2/</loc><lastmod>2014-09-02T00:36:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/1_edit1.png</image:loc><image:title>1_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/02_edit/</loc><lastmod>2014-09-02T00:38:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/02_edit.png</image:loc><image:title>02_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/03_edit/</loc><lastmod>2014-09-02T00:42:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/03_edit.png</image:loc><image:title>03_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/04_edit/</loc><lastmod>2014-09-02T00:47:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/04_edit.png</image:loc><image:title>04_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/05_edit/</loc><lastmod>2014-09-02T00:48:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/05_edit.png</image:loc><image:title>05_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/06_edit/</loc><lastmod>2014-09-02T00:49:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/06_edit.png</image:loc><image:title>06_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/08_edit/</loc><lastmod>2014-09-02T00:50:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/08_edit.png</image:loc><image:title>08_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2facode/</loc><lastmod>2014-09-02T00:51:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/2facode.png</image:loc><image:title>2facode</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/09_edit/</loc><lastmod>2014-09-02T00:52:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/09_edit.png</image:loc><image:title>09_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/10_edit-2/</loc><lastmod>2014-09-02T00:53:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/10_edit1.png</image:loc><image:title>10_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/11_edit-2/</loc><lastmod>2014-09-02T00:54:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/11_edit.jpg</image:loc><image:title>11_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2014-09-02T19:23:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/screen-shot-2014-09-02-at-3-22-31-pm.png</image:loc><image:title>Screen Shot 2014-09-02 at 3.22.31 PM</image:title><image:caption>twofactorauth.org maintains a list of websites that support 2FA</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2014-09-02T19:29:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/screen-shot-2014-09-02-at-3-29-02-pm.png</image:loc><image:title>Screen Shot 2014-09-02 at 3.29.02 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/10_edit-3/</loc><lastmod>2014-09-02T21:25:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/10_edit2.png</image:loc><image:title>10_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/10_new_edit/</loc><lastmod>2014-09-02T21:30:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/10_new_edit.png</image:loc><image:title>10_new_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2014-09-16T20:31:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/2fa_icloud.jpg</image:loc><image:title>2fa_icloud</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2014-09-16T20:33:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/elcom_fail.jpg</image:loc><image:title>elcom_fail</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2014-09-28T23:23:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/womenssymposium.jpg</image:loc><image:title>womenssymposium</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2014-09-28T23:28:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/women.jpg</image:loc><image:title>NYU-Poly Cybersecurity Women's Symposium</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2014-09-28T23:31:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/women2.jpg</image:loc><image:title>NYU-Poly Cybersecurity Women's Symposium</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2014-09-28T23:34:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/09/women3.jpg</image:loc><image:title>NYU-Poly Women's Cybersecurity Symposium</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/</loc><lastmod>2014-11-25T00:14:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/11/maze.png</image:loc><image:title>maze</image:title><image:caption>An example maze. The step spaces are blank, the walls are +-|, the END marker is the # sign, and the current path is the X's.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/</loc><lastmod>2014-12-03T19:56:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/12/image00.png</image:loc><image:title>Maze (Before)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/</loc><lastmod>2014-12-03T19:57:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2014/12/image01.png</image:loc><image:title>Maze (After)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/05/05/empire-hacking/</loc><lastmod>2015-05-05T18:27:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/05/empirehacking_poster_final.png</image:loc><image:title>EmpireHacking_Poster_Final</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/05/13/closing-the-windows-gap/</loc><lastmod>2015-05-13T19:41:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/05/missilegap_nie11-8-60.png</image:loc><image:title>WindowsGap</image:title><image:caption>Projected magnitude of the Windows gap</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/05/13/closing-the-windows-gap/</loc><lastmod>2015-05-13T19:49:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/05/img_0676.jpg</image:loc><image:title>alex</image:title><image:caption>This man knows Windows and thinks you should too.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:08:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image12.png</image:loc><image:title>image12</image:title><image:caption>Separate the role for administrative access to your domain</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:09:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image15.png</image:loc><image:title>image15</image:title><image:caption>Limit what can go wrong with email</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:10:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image14.png</image:loc><image:title>image14</image:title><image:caption>Disable automatic forward</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:10:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image11.png</image:loc><image:title>image11</image:title><image:caption>Keep your mail to yourself</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:11:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image03.png</image:loc><image:title>image03</image:title><image:caption>Why is this even an option? Turn it on already!</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:11:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image10.png</image:loc><image:title>image10</image:title><image:caption>Delete or suspend unmaintained accounts</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:12:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image09.png</image:loc><image:title>image09</image:title><image:caption>Disable contact sharing</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:13:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image13.png</image:loc><image:title>image13</image:title><image:caption>Stricter defaults for Drive</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:13:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image00.png</image:loc><image:title>image00</image:title><image:caption>Stricter defaults for Drive</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:14:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image07.png</image:loc><image:title>image07</image:title><image:caption>Help users recognize who they are talking to</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:14:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image02.png</image:loc><image:title>image02</image:title><image:caption>Don't overstore data if you don't need to</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:15:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image06.png</image:loc><image:title>image06</image:title><image:caption>Help users understand who can see their Site</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:15:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image01.png</image:loc><image:title>image01</image:title><image:caption>Turn on DKIM for your domain and get this green check</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:15:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image04.png</image:loc><image:title>image04</image:title><image:caption>There are dozens of services you'll never use. Disable them.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:16:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image05.png</image:loc><image:title>image05</image:title><image:caption>Turn on alerts and be liberal with who gets them</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T18:17:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image08.png</image:loc><image:title>image08</image:title><image:caption>Attachment compliance options could be useful to play with</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T04:35:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image001.png</image:loc><image:title></image:title><image:caption>Figure 5: Average and median performance scores of the top ten qualifying event participants. Orange bars signify finalists.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T04:31:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image011.png</image:loc><image:title></image:title><image:caption>Figure 2: Our bug finding architecture. It is a feedback-based architecture that explores the state space of a program using fuzzing and symbolic execution.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T04:34:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image021.png</image:loc><image:title></image:title><image:caption>Figure 3: Teams in the qualifying event ranked by patch effectiveness (security score). Orange bars signify finalists.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T04:34:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image031.png</image:loc><image:title></image:title><image:caption>Figure 4: The count of perfectly functional, partially functional, and nonfunctional challenges submitted by each of the top 10 teams in the qualifying event. Orange bars signify finalists.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T04:30:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image041.png</image:loc><image:title></image:title><image:caption>Figure 1: Teams in the qualifying event ranked by number of bugs found. Orange bars signify finalists.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:28:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image002.png</image:loc><image:title>image00</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:28:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image012.png</image:loc><image:title>image01</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:28:06Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image022.png</image:loc><image:title>image02</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:28:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image032.png</image:loc><image:title>image03</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:28:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/image042.png</image:loc><image:title>image04</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:56:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/untitled-drawing.png</image:loc><image:title>Untitled drawing</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T02:59:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/nop.png</image:loc><image:title>nop</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T03:04:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/c53eba45e0.png</image:loc><image:title>c53eba45e0</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T03:24:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/07/screen-shot-2015-07-20-at-11-22-36-pm.png</image:loc><image:title>Screen Shot 2015-07-20 at 11.22.36 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/10/summer-trail-of-bits/</loc><lastmod>2015-09-03T04:27:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image00.jpg</image:loc><image:title></image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/10/summer-trail-of-bits/</loc><lastmod>2015-09-03T15:15:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image00.png</image:loc><image:title>file_diagram</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:24:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image15.png</image:loc><image:title>image15</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:27:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image21.png</image:loc><image:title>image21</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:28:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image09.png</image:loc><image:title>image09</image:title><image:caption>Main IDAPython Script</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:29:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image16.png</image:loc><image:title>image16</image:title><image:caption>IDAPython script to dump prime index map</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:29:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image25.png</image:loc><image:title>image25</image:title><image:caption>IDAPython script to dump "rounds"</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:31:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image08.png</image:loc><image:title>image08</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:32:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image29.png</image:loc><image:title>image29</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:33:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image22.png</image:loc><image:title>image22</image:title><image:caption>In Windbg</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:34:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image03.png</image:loc><image:title>image03</image:title><image:caption>In Windbg</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:34:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image24.png</image:loc><image:title>image24</image:title><image:caption>In Windbg</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:35:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image13.png</image:loc><image:title>image13</image:title><image:caption>In Windbg</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:36:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image28.png</image:loc><image:title>image28</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:37:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image23.png</image:loc><image:title>image23</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:37:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image31.png</image:loc><image:title>image31</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:38:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image30.png</image:loc><image:title>image30</image:title><image:caption>Python Pseudocode</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:39:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image001.png</image:loc><image:title>image00</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:40:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image19.png</image:loc><image:title>image19</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:41:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image01.png</image:loc><image:title>image01</image:title><image:caption>Python Pseudocode</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:41:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image10.png</image:loc><image:title>image10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:42:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image05.png</image:loc><image:title>image05</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:43:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image07.png</image:loc><image:title>image07</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:43:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image17.png</image:loc><image:title>image17</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:44:26Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image04.png</image:loc><image:title>image04</image:title><image:caption>Diagram showing the different decryption stages</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:44:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image14.png</image:loc><image:title>image14</image:title><image:caption>Indexing Algorithm</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:45:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image26.png</image:loc><image:title>image26</image:title><image:caption>Math Used to Calculate Loops Needed</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:46:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image02.png</image:loc><image:title>image02</image:title><image:caption>Python-Windbg Pseudo Code</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:46:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image12.jpg</image:loc><image:title>image12</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:51:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/screen-shot-2015-09-08-at-7-51-24-pm.png</image:loc><image:title>Screen Shot 2015-09-08 at 7.51.24 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:52:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/screen-shot-2015-09-08-at-7-52-32-pm.png</image:loc><image:title>Screen Shot 2015-09-08 at 7.52.32 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:54:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/screen-shot-2015-09-08-at-7-54-05-pm.png</image:loc><image:title>Screen Shot 2015-09-08 at 7.54.05 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:55:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image06-1.png</image:loc><image:title>image06-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:56:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image11-1.png</image:loc><image:title>image11-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:57:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image20-1.png</image:loc><image:title>image20-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-08T23:58:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/09/image27-1.png</image:loc><image:title>image27-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/10/30/why-we-give-so-much-to-csaw/</loc><lastmod>2015-10-30T05:11:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/10/image00.jpg</image:loc><image:title>Trail of Bits T-Shirt</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/10/30/why-we-give-so-much-to-csaw/</loc><lastmod>2015-10-30T05:16:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/10/image00.png</image:loc><image:title>Solution to Bricks of Gold</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/12/15/self-hosted-video-chat-with-tuber/</loc><lastmod>2015-12-14T17:17:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/12/tubertc_final.jpg</image:loc><image:title>TuberTC_FINAL</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2015/12/15/self-hosted-video-chat-with-tuber/</loc><lastmod>2015-12-15T02:06:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2015/12/tuber.png</image:loc><image:title>Tuber</image:title><image:caption>Tuber's loveable mascot, Karl</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/01/05/lets-encrypt-the-internet/</loc><lastmod>2016-01-05T04:45:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/01/letsencrypt-logo-horizontal.png</image:loc><image:title>Let's Encrypt</image:title><image:caption>Let’s Encrypt is an open, automated, and free SSL Certificate Authority</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/</loc><lastmod>2016-01-12T23:43:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/01/image01.png</image:loc><image:title>image01</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/</loc><lastmod>2016-01-12T23:44:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/01/image02.png</image:loc><image:title>image02</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/</loc><lastmod>2016-01-12T23:45:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/01/image00.png</image:loc><image:title>image00</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/</loc><lastmod>2016-02-09T03:24:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/02/tidas.png</image:loc><image:title>Tidas</image:title><image:caption>Tidas: Make passwords obsolete</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/</loc><lastmod>2016-02-09T03:26:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/02/tidas_green.png</image:loc><image:title>Tidas</image:title><image:caption>Tidas: Make passwords obsolete</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/</loc><lastmod>2016-02-17T06:32:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/02/screen-shot-2016-02-16-at-11-14-30-pm.png</image:loc><image:title>Screen Shot 2016-02-16 at 11.14.30 PM</image:title><image:caption>The Hardware Key is stored in the Secure Enclave in A7 and newer devices</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/</loc><lastmod>2016-02-17T06:32:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/02/screen-shot-2016-02-16-at-11-15-18-pm.png</image:loc><image:title>Screen Shot 2016-02-16 at 11.15.18 PM</image:title><image:caption>Passcode delays are enforced by the Secure Enclave in A7 and newer devices</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/</loc><lastmod>2016-02-18T04:35:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/02/screen-shot-2016-02-17-at-11-31-16-pm.png</image:loc><image:title>Screen Shot 2016-02-17 at 11.31.16 PM</image:title><image:caption>Passcodes can only be guessed once every 80ms</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</loc><lastmod>2016-03-09T16:31:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/03/image04.png</image:loc><image:title>image04</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</loc><lastmod>2016-03-09T16:33:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/03/image03.png</image:loc><image:title>LightHTTPD Use-After-Free</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</loc><lastmod>2016-03-09T16:38:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/03/screen-shot-2016-03-09-at-11-37-41-am.png</image:loc><image:title>Four steps to creating a data-flow graph</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/04/01/hacker-handle-bounty/</loc><lastmod>2016-04-01T02:39:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/03/image00.jpg</image:loc><image:title></image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:42:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image01.png</image:loc><image:title>image01</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:43:18Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image03.png</image:loc><image:title>image03</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:43:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image05.png</image:loc><image:title>image05</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:44:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image02.png</image:loc><image:title>image02</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:46:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image07.png</image:loc><image:title>image07</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:46:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image04.png</image:loc><image:title>image04</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:46:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image06.png</image:loc><image:title>image06</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T20:47:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/image00.png</image:loc><image:title>image00</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T21:58:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/screen-shot-2016-05-05-at-11-57-35-pm.png</image:loc><image:title>Screen Shot 2016-05-05 at 11.57.35 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-06T09:44:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/screen-shot-2016-05-06-at-11-43-19-am.png</image:loc><image:title>Screen Shot 2016-05-06 at 11.43.19 AM</image:title><image:caption>Kenna's data on FREAK overlaps precisely with internet-wide scans from the University of Michigan</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-12T17:44:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/screen-shot-2016-05-12-at-1-40-20-pm.png</image:loc><image:title>Screen Shot 2016-05-12 at 1.40.20 PM</image:title><image:caption>What is the point of Kenna's contribution if it was not backed by their insights?</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-12T17:54:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/screen-shot-2016-05-12-at-1-40-36-pm.png</image:loc><image:title>Screen Shot 2016-05-12 at 1.40.36 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-05-26T22:08:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/screen-shot-2016-05-25-at-9-50-04-pm.png</image:loc><image:title>Screen Shot 2016-05-25 at 9.50.04 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-05-26T22:11:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/binarynina-overview.png</image:loc><image:title>binarynina-overview</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-05-26T22:11:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/binaryninja-ilview.png</image:loc><image:title>binaryninja-ilview</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-05-26T22:11:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/05/binaryninja-inlinememcpy.png</image:loc><image:title>binaryninja-inlinememcpy</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T02:42:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/stock-image-fail-soldering-iron-bob-byron-1.jpg</image:loc><image:title>stock-image-fail-soldering-iron-bob-byron-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T02:44:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/stock-photo-88593521-scientist-uses-modern-technology-for-its-research.jpg</image:loc><image:title>stock-photo-88593521-scientist-uses-modern-technology-for-its-research</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T02:45:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/depositphotos_11605816-security-concept-lock-on-digital.jpg</image:loc><image:title>depositphotos_11605816-Security-concept-lock-on-digital</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T03:04:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/ck755riwkaa5pon.jpg</image:loc><image:title>Ck755rIWkAA5pon</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T03:06:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/shot0737.jpg</image:loc><image:title>shot0737</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/06/28/start-using-the-secure-enclave-crypto-api/</loc><lastmod>2016-06-27T23:21:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/06/tidas-login.png</image:loc><image:title>tidas-login</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/</loc><lastmod>2016-07-12T03:42:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/07/tokens.png</image:loc><image:title>tokens</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/</loc><lastmod>2016-07-12T05:20:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/07/screen-shot-2016-07-12-at-7-19-44-am.png</image:loc><image:title>Screen Shot 2016-07-12 at 7.19.44 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/</loc><lastmod>2016-07-13T12:33:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/07/screen-shot-2016-07-13-at-2-30-19-pm.png</image:loc><image:title>Screen Shot 2016-07-13 at 2.30.19 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/08/02/engineering-solutions-to-hard-program-analysis-problems/</loc><lastmod>2016-08-02T00:11:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/08/excavator-granary_720.jpg</image:loc><image:title>Note that proper pronounciation of GRR includes 2 fits held at head height</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/08/02/engineering-solutions-to-hard-program-analysis-problems/</loc><lastmod>2016-08-02T00:12:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/08/frankenpse.jpg</image:loc><image:title>frankenpse</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/</loc><lastmod>2016-09-26T00:49:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/09/doorman.jpg</image:loc><image:title>doorman</image:title><image:caption>The Windows version of osquery can talk to existing osquery fleet management tools, such as doorman. osquery for Windows has full support for TLS remote endpoints and certificate validation, just like the Unix version. In this screenshot, we are using an existing doorman instance to find all running processes on a Windows machine.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/</loc><lastmod>2016-09-26T00:52:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/09/image00.png</image:loc><image:title>osqueryi</image:title><image:caption>osqueryi, the interactive osquery shell, also works on Windows. In this screenshot we are using osquery to query the list of running processes and the cryptographic hash of a file.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/</loc><lastmod>2016-09-26T20:04:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/09/osqueryi.png</image:loc><image:title>osqueryi</image:title><image:caption>osqueryi, the interactive osquery shell, also works on Windows. In this screenshot we are using osquery to query the list of running processes and the cryptographic hash of a file.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/</loc><lastmod>2016-11-02T06:04:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/11/image00.png</image:loc><image:title>GRR</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/</loc><lastmod>2016-11-02T06:05:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/11/grr.png</image:loc><image:title>grr</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/</loc><lastmod>2016-11-02T06:07:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/11/image01.png</image:loc><image:title>NRFIN_00006</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/</loc><lastmod>2016-12-27T07:53:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/12/cfg_violation.png</image:loc><image:title>cfg_violation</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/</loc><lastmod>2016-12-27T07:55:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/12/clang_valid_dests.png</image:loc><image:title>clang_valid_dests</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/</loc><lastmod>2016-12-27T07:55:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2016/12/vs_valid_dests.png</image:loc><image:title>vs_valid_dests</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:21:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image1-01.png</image:loc><image:title>image1-01</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:21:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image1-02.png</image:loc><image:title>image1-02</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:21:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image1-03.png</image:loc><image:title>image1-03</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:21:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image1-04.png</image:loc><image:title>image1-04</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:24:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image2.png</image:loc><image:title>image2</image:title><image:caption>Low Level IL representation of the x86 instruction `repne cmpsb`</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:25:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image3.png</image:loc><image:title>image3</image:title><image:caption>IL tree for mov eax, 2</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:25:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image4.png</image:loc><image:title>image4</image:title><image:caption>IL tree for lea eax, [edx+ecx*4]</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:25:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/image5.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:33:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/screen-shot-2017-01-30-at-2-32-06-pm.png</image:loc><image:title>screen-shot-2017-01-30-at-2-32-06-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-30T19:36:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/arm-x64-il-comparison.png</image:loc><image:title>arm-x64-il-comparison</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-02-11T19:20:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/01/traverse-il.png</image:loc><image:title>traverse-il</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-02-12T19:59:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/annotated-vtable-dispatch-llil.png</image:loc><image:title>annotated-vtable-dispatch-llil</image:title><image:caption>Figure 3: LLIL tree structures for the example vtable dispatch assembly, annotated with operation_handler calls and propagation of concrete values back up the call chain.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-02-12T19:26:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/constructor-example.png</image:loc><image:title>constructor-example</image:title><image:caption>An example constructor. The highlighted instruction stores a vtable in the object’s structure.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-02-12T20:15:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/vtable-diagram.png</image:loc><image:title>vtable-diagram</image:title><image:caption>Figure 1: Two classes inherit from a base virtual class.
Each class's virtual table points to its respective implementation of the virtual functions.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-02-12T19:54:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/vtable-dispatch-llil.png</image:loc><image:title>vtable-dispatch-llil</image:title><image:caption>Figure 2: LLIL tree structures for the example vtable dispatch assembly.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/</loc><lastmod>2017-02-15T23:31:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/img_4819.jpg</image:loc><image:title>img_4819</image:title><image:caption>You should go to BSidesLisbon</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:32:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/image01.png</image:loc><image:title>image01</image:title><image:caption>Figure 2: An idealized view of the valid indirect call targets for ClangCFI, CFGuard, and how they compare to the (idealized) set of valid indirect call targets.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:33:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/image00.png</image:loc><image:title>image00</image:title><image:caption>Figure 3: How real existing code relates to the indirect call targets for ClangCFI and CFGuard. There are valid, programmer intended targets that fall outside the domains defined by ClangCFI and CFGuard.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:34:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/screen-shot-2017-02-20-at-2-34-04-pm.png</image:loc><image:title>screen-shot-2017-02-20-at-2-34-04-pm</image:title><image:caption>Valid linkages when using ClangCFI. These linkages are what is valid in general, assuming there are indirect calls between the linked items. Calls across dynamic shared objects (DSOs) calls are valid assuming the use of the experimental -f[no-]sanitize-cfi-cross-dso flag</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:46:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/image03.png</image:loc><image:title>ClangCFI</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:46:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/image02.png</image:loc><image:title>CFGuard</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:55:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/screen-shot-2017-02-20-at-2-54-02-pm.png</image:loc><image:title>Valid Destinations for Indirect Calls</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T13:57:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/02/screen-shot-2017-02-20-at-2-56-09-pm.png</image:loc><image:title>screen-shot-2017-02-20-at-2-56-09-pm</image:title><image:caption>asdfasdf</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/03/23/april-means-infiltrate/</loc><lastmod>2017-03-22T16:51:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/03/79f163e7-0355-4bb4-807c-856a2d337915.jpg</image:loc><image:title>79F163E7-0355-4BB4-807C-856A2D337915</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/04/14/a-walk-down-memory-lane/</loc><lastmod>2017-04-13T22:45:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/04/screenshot-from-2017-04-13-18-43-18.png</image:loc><image:title>Screenshot from 2017-04-13 18-43-18</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/05/15/magic-with-manticore/</loc><lastmod>2017-05-15T01:39:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/05/image1.png</image:loc><image:title>Example Magic binary challenge</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/</loc><lastmod>2017-07-30T22:31:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/07/image1.jpg</image:loc><image:title>Binary Ninja in action during the competition</image:title><image:caption>Binary Ninja in action during the competition</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/</loc><lastmod>2017-07-30T22:32:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/07/image2.png</image:loc><image:title>image2</image:title><image:caption>Binary Ninja’s graph view allowed us to rapidly analyze control flow structures</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/</loc><lastmod>2017-07-30T23:24:06Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/07/image_uploaded_from_ios.jpg</image:loc><image:title>image_uploaded_from_ios</image:title><image:caption>Binary Ninja in action during the competition</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/08/02/microsoft-didnt-sandbox-windows-defender-so-i-did/</loc><lastmod>2017-07-31T15:31:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/07/image1.gif</image:loc><image:title>image1</image:title><image:caption>Flying Sandbox Monster running Defender in a sandbox to scan a WannaCry binary.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/08/02/microsoft-didnt-sandbox-windows-defender-so-i-did/</loc><lastmod>2017-07-31T15:31:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/07/image21.png</image:loc><image:title>image2</image:title><image:caption>The basic architecture of Flying Sandbox Monster.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-09T14:49:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-09T14:49:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-09T14:50:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-09T14:50:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/12/ios-jailbreak-detection-toolkit-now-available/</loc><lastmod>2017-10-10T21:01:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image1.jpg</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:20:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/mike.jpg</image:loc><image:title>mike</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:24:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/chris.jpg</image:loc><image:title>chris</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:24:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/evan_t.png</image:loc><image:title>evan_t</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:24:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/evan_s.jpg</image:loc><image:title>evan_s</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:24:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/alessandro.jpg</image:loc><image:title>alessandro</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T03:29:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/evan_s1.jpg</image:loc><image:title>evan_s</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T13:23:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/img_6283-1.jpg</image:loc><image:title>IMG_6283 (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-17T01:32:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/1.png</image:loc><image:title>1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-17T01:32:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/3.png</image:loc><image:title>3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-17T01:32:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/4.png</image:loc><image:title>4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-17T01:32:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/5.png</image:loc><image:title>5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/10/19/trail-of-bits-joins-the-enterprise-ethereum-alliance/</loc><lastmod>2017-10-18T23:05:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/10/image11.png</image:loc><image:title>Ethereum Enterprise Alliance</image:title><image:caption>We’re helping to secure Ethereum with our expertise, tools, and results.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/11/06/hands-on-the-ethernaut-ctf/</loc><lastmod>2017-11-06T17:03:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/11/ethersplay_large.png</image:loc><image:title>ethersplay_large</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2017/12/21/osquery-pain-points/</loc><lastmod>2017-12-20T22:06:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2017/12/screen-shot-2017-12-20-at-5-05-57-pm.png</image:loc><image:title>Screen Shot 2017-12-20 at 5.05.57 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/</loc><lastmod>2018-01-22T19:43:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image2.png</image:loc><image:title>McSema</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/</loc><lastmod>2018-01-22T19:44:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image1.png</image:loc><image:title>Come with me if you want to lift</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/</loc><lastmod>2018-01-22T19:49:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/arnold.png</image:loc><image:title>arnold</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:45:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image21.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:47:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image6.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:50:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:55:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image11.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:56:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-29T20:57:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/01/image5.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T01:43:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image6.png</image:loc><image:title>Branch Prediction and Speculative Execution</image:title><image:caption>Figure 1: How branch misprediction leads to speculative execution. When the branch predictor makes an incorrect guess about the destination of a conditional branch, some instructions are speculatively executed. The execution of these instructions is undone, but their effects on the cache remain. Spectre causes the branch predictor to guess wrong and speculatively execute a carefully chosen set of instructions.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T01:46:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image4.png</image:loc><image:title>Hypothetical Branch History Buffer Operation</image:title><image:caption>Figure 3: The branch history buffer is used to predict the target of indirect branches, so that the processor can execute them faster. When an indirect branch executes, an entry is written into the table. The table has limited space, and is indexed based on branch address. Because of this limitation, it is possible to “poison” the branch predictor and make it guess an attacker-chosen address for any indirect branch. In this hypothetical prediction example, any branch at an address ending in 045C would have the same predicted destination. </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T01:57:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image3.png</image:loc><image:title>Spectre V2: Attack Preparation</image:title><image:caption>Figure 4: A simplified diagram of how a cloud computing system would look after completing Step 6 of this attack description. The attacker has gathered all information they need to conduct the attack, but the key part is still to come.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T01:59:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image5.png</image:loc><image:title>Spectre V2: Attack Execution</image:title><image:caption>Figure 5: This is the core of the Spectre V2 attack: specially crafted indirect branches can trick the Branch History Buffer into predicting an attacker-chosen speculative destination for an indirect branch. In this case, an indirect branch in the hypervisor is set to speculatively point to the eBPF interpreter code instead of its original location.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T02:01:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image1.png</image:loc><image:title>Spectre V2: Leaking Secrets</image:title><image:caption>Figure 6: A visualization of how secrets can be leaked in a Spectre V2 attack. The eBPF interpreter speculatively executes attacker-specified eBPF code which will read a secret value and use it to access reader. The effects of speculative execution can be observed via a cache-timing side channel.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T02:06:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image2.png</image:loc><image:title>Computer Memory Layout (Not to Scale)</image:title><image:caption>Figure 2: A hypothetical layout of reader and some secret data in computer memory. Because computer memory is laid out linearly, it is possible to access any part of it in terms of a positive or negative index into reader. Access to reader should be limited by its bounds, 0 to 255. If bounds checks are bypassed, even by a few speculatively executed instructions, it is possible to access memory without proper permission. </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/disassembly.png</image:loc><image:title>disassembly</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/llil.png</image:loc><image:title>LLIL</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/mlil_structures.png</image:loc><image:title>MLIL_Structures</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/mlil_vs_ssa.png</image:loc><image:title>mlil_vs_ssa</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/mlil.png</image:loc><image:title>MLIL</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/possible_values.png</image:loc><image:title>possible_values</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/find_heartbleed_new.png</image:loc><image:title>find_heartbleed_new</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:09:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/find_heartbleed_old.png</image:loc><image:title>find_heartbleed_old</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-03-30T17:19:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/03/image8.png</image:loc><image:title>image8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-04-02T21:57:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/04/llil_example.png</image:loc><image:title>llil_example</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/03/state-machine-testing-with-echidna/</loc><lastmod>2018-05-01T15:26:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/04/790px-turnstile_state_machine_colored-svg.png</image:loc><image:title>790px-Turnstile_state_machine_colored.svg</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/</loc><lastmod>2018-05-25T20:28:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/05/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/</loc><lastmod>2018-05-25T20:28:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/05/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/</loc><lastmod>2018-05-25T20:28:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/05/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/</loc><lastmod>2018-05-30T14:53:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/05/image21.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/</loc><lastmod>2018-05-30T14:53:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/05/image11.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/</loc><lastmod>2018-06-08T12:35:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/06/image2-e1528461320901.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/</loc><lastmod>2018-06-08T01:22:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/06/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/</loc><lastmod>2018-06-08T01:23:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/06/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/truck-1/</loc><lastmod>2018-06-28T18:33:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/06/truck-1.jpg</image:loc><image:title>Truck-1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:04:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:05:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:05:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:06:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image5.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:06:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T04:28:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/screen-shot-2018-07-06-at-12-28-07-am.png</image:loc><image:title>Screen Shot 2018-07-06 at 12.28.07 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/01/bluetooth-invalid-curve-points/</loc><lastmod>2018-07-31T22:07:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image21.png</image:loc><image:title></image:title><image:caption>Fig. 1: An elliptic curve (as used in cryptography)</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/01/bluetooth-invalid-curve-points/</loc><lastmod>2018-07-31T22:07:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/07/image11.png</image:loc><image:title></image:title><image:caption>Fig. 2: Addition, and the point at infinity (note: these illustrations use a continuous curve for visualization, but that’s still not what we’re working with)</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T03:00:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image25.png</image:loc><image:title>image25</image:title><image:caption>Figure 1. Bit flip results for toy program</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T03:01:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image24.png</image:loc><image:title>image24</image:title><image:caption>Figure 2. Bit flip results for mbed TLS</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:48:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image241.png</image:loc><image:title>image24</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:48:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image27.png</image:loc><image:title>image27</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:48:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image28.png</image:loc><image:title>image28</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:48:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image29.png</image:loc><image:title>image29</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:56:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image1.jpeg</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:56:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T15:56:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:11:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:11:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image21.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:11:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image31.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:12:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image11.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:26:20Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image12.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:26:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image22.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:27:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/image32.png</image:loc><image:title>image3</image:title><image:caption>Fig. 5: Excerpt from GDB script called from Python code to induce faults in mbed TLS</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/security-descriptor-diagram-1/</loc><lastmod>2018-08-21T14:40:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/08/security-descriptor-diagram-1.png</image:loc><image:title>Security Descriptor Diagram (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/06/rattle-an-ethereum-evm-binary-analysis-framework/</loc><lastmod>2018-09-05T07:52:26Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image1.png</image:loc><image:title>image1</image:title><image:caption>Figure 1: asdf</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/06/rattle-an-ethereum-evm-binary-analysis-framework/</loc><lastmod>2018-09-05T07:53:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image2.png</image:loc><image:title>image2</image:title><image:caption>Figure 2: asdf</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:57:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure1.png</image:loc><image:title>figure1</image:title><image:caption>Figure 1: High-level overview of the data separation upgrade pattern</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:54:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure4.png</image:loc><image:title>figure4</image:title><image:caption>Figure 4: </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:55:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure5.png</image:loc><image:title>figure5</image:title><image:caption>Figure 5: Upgrade by deploying a new logic contract and forwarding calls to it from the old one</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:55:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure6.png</image:loc><image:title>figure6</image:title><image:caption>Figure 6:</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:59:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure7.png</image:loc><image:title>figure7</image:title><image:caption>Figure 7: </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T08:59:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure9.png</image:loc><image:title>figure9</image:title><image:caption>Figure 9: </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T09:00:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure11.png</image:loc><image:title>figure11</image:title><image:caption>Figure 11: </image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T09:00:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/figure12.png</image:loc><image:title>figure12</image:title><image:caption>Figure 12:</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2018-09-06T23:30:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2018-09-07T00:13:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2018-09-07T00:13:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image11.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2018-09-07T00:30:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/image21.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/09/26/effortless-security-feature-detection-with-winchecksec/</loc><lastmod>2018-09-25T21:36:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/09/unnamed.png</image:loc><image:title>unnamed</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:09:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/201308.gif</image:loc><image:title>201308</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:47:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/2013081.gif</image:loc><image:title>201308</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:52:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/screen-shot-2018-10-18-at-9-52-02-pm.png</image:loc><image:title>Screen Shot 2018-10-18 at 9.52.02 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:54:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/screen-shot-2018-10-18-at-9-54-01-pm.png</image:loc><image:title>Screen Shot 2018-10-18 at 9.54.01 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:55:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/screen-shot-2018-10-18-at-9-55-07-pm.png</image:loc><image:title>Screen Shot 2018-10-18 at 9.55.07 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T01:59:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T02:04:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/screen-shot-2018-10-18-at-10-04-31-pm.png</image:loc><image:title>Screen Shot 2018-10-18 at 10.04.31 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:04:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image6.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:04:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:04:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image10.png</image:loc><image:title>image10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:04:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image5.jpg</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:05:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image8.png</image:loc><image:title>image8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:05:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image7.png</image:loc><image:title>image7</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:06:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:06:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image9.png</image:loc><image:title>image9</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T02:36:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/codecogseqn-3.png</image:loc><image:title>CodeCogsEqn (3)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2018-10-26T01:04:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image1.jpg</image:loc><image:title>image1</image:title><image:caption>A weird machine is a snippet of code that will process valid or invalid input in a way that the programmer did not intend.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2018-10-26T01:05:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image4.png</image:loc><image:title>image4</image:title><image:caption>A vulnerability is used to alter either program execution or data state. Execution after this is either a weird state or a state operating on unintended data.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2018-10-26T01:05:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image31.png</image:loc><image:title>image3</image:title><image:caption>The execution contract defines areas of the program which are executable (yellow). These have diminished over the years as the contract has tightened.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2018-10-26T01:06:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/10/image21.png</image:loc><image:title>image2</image:title><image:caption>A Hoare triple with imprecisely defined preconditions allows for a “weird” state change to occur. Tightening these preconditions by improving input checks would make these states unattainable.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/11/16/trail-of-bits-devcon-iv-recap/</loc><lastmod>2018-11-16T06:08:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/11/blockchain-autopsies-lightning2.jpg</image:loc><image:title>Blockchain-Autopsies-lightning2</image:title><image:caption>Filtering deployment mistakes, DoS attacks, and spam to identify suspect self-destructs</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T00:33:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/11/44917824762_dc1fa21afd_k.jpg</image:loc><image:title>44917824762_dc1fa21afd_k</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T00:40:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/11/img_4723.jpeg</image:loc><image:title>IMG_4723</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T00:41:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/11/fake-ledger-scam-768x1151-source-reddit.jpg</image:loc><image:title>fake-ledger-scam-768x1151 (source Reddit)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T00:49:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2018/11/img_4726.jpeg</image:loc><image:title>IMG_4726</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-01T20:12:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-01T20:13:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-01T20:13:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-01T20:13:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/</loc><lastmod>2019-01-11T15:07:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/bugbountydata3.jpg</image:loc><image:title>bugbountydata3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/</loc><lastmod>2019-01-11T15:16:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/bugbountryplot.jpg</image:loc><image:title>bugbountryplot</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/</loc><lastmod>2019-01-11T15:21:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/pestdata.jpg</image:loc><image:title>pestdata</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/</loc><lastmod>2019-01-17T01:18:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/db507809-cf5a-4662-bf7a-0219be51b8c1.png</image:loc><image:title>db507809-cf5a-4662-bf7a-0219be51b8c1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/htop/</loc><lastmod>2019-01-17T04:47:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/htop.png</image:loc><image:title>htop</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/nms2_185_dsc_0586_chwag/</loc><lastmod>2019-01-18T00:55:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/nms2_185_dsc_0586_chwag.jpg</image:loc><image:title>nms2_185_dsc_0586_chwag</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/nms2_149_dsc_0491_chwag/</loc><lastmod>2019-01-18T00:55:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/nms2_149_dsc_0491_chwag.jpg</image:loc><image:title>nms2_149_dsc_0491_chwag</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/</loc><lastmod>2019-01-19T15:32:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/exception-blogpost-2.jpg</image:loc><image:title>exception blogpost (2)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/</loc><lastmod>2019-01-19T15:33:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/exceptionblog.jpg</image:loc><image:title>exceptionblog</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/</loc><lastmod>2019-01-20T09:35:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/exceptionblog-1.jpg</image:loc><image:title>exceptionblog</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/</loc><lastmod>2019-01-24T18:52:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/screen-shot-2019-01-24-at-1.47.01-pm.png</image:loc><image:title>DSM and SSM vs KLEE coverage</image:title><image:caption>Dynamic State Merging (DSM) provided more statement coverage than Static State Merging (SSM). Figure from "Efficient state merging in symbolic execution." Kuznetsov et al. 11 Jun. 2012.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/</loc><lastmod>2019-01-24T18:58:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/pasted-image-0.png</image:loc><image:title>Merged CFG Annotated</image:title><image:caption>Merged CFG Annotated</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/</loc><lastmod>2019-01-24T19:16:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/01/pasted-image-0-1.png</image:loc><image:title>Merged CFG Annotated</image:title><image:caption>Merged CFG Annotated</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/win10calc/</loc><lastmod>2019-03-13T21:49:26Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/win10calc.png</image:loc><image:title>win10calc</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/universalapps/</loc><lastmod>2019-03-13T21:52:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/universalapps.png</image:loc><image:title>universalapps</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/fuzzcrash/</loc><lastmod>2019-03-13T21:59:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/fuzzcrash.png</image:loc><image:title>fuzzcrash</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/interestingcrash/</loc><lastmod>2019-03-13T22:00:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/interestingcrash.png</image:loc><image:title>interestingcrash</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/03/25/what-application-developers-need-to-know-about-tls-early-data-0rtt/</loc><lastmod>2019-03-21T05:21:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/earlydata.png</image:loc><image:title>earlydata</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T03:38:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/pasted-image-0.png</image:loc><image:title>pasted image 0</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T03:39:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/unnamed.png</image:loc><image:title>unnamed</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T03:40:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/03/pasted-image-0-1.png</image:loc><image:title>pasted image 0 (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T19:21:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/237667.cast_.gif</image:loc><image:title>237667.cast</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/</loc><lastmod>2019-04-05T03:09:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/screen-shot-2019-04-04-at-3.38.04-pm.png</image:loc><image:title>sc-sl0</image:title><image:caption>A sample function targeting window for a built-in Windows utility</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/09/announcing-querycon-2019/</loc><lastmod>2019-04-04T23:28:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/theforum-e1463704569766.png</image:loc><image:title>TheForum-e1463704569766</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/</loc><lastmod>2019-04-05T04:52:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/dsbuffer.bmp_.png</image:loc><image:title>dsBuffer.bmp</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/</loc><lastmod>2019-04-05T05:04:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/screen-shot-2019-04-05-at-12.04.17-am-e1554440733273.png</image:loc><image:title>Screen Shot 2019-04-05 at 12.04.17 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/</loc><lastmod>2019-04-18T16:11:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/screen-shot-2019-04-18-at-8.56.40-am.png</image:loc><image:title>Screen Shot 2019-04-18 at 8.56.40 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/</loc><lastmod>2019-04-18T16:12:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/screen-shot-2019-04-18-at-8.58.37-am.png</image:loc><image:title>Screen Shot 2019-04-18 at 8.58.37 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/</loc><lastmod>2019-04-18T16:19:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/04/vscode.png</image:loc><image:title>VSCode</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-25T00:33:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image1.png</image:loc><image:title>image1</image:title><image:caption>Fig. 1: How Slither works</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-25T00:34:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image2.png</image:loc><image:title>image2</image:title><image:caption>Fig. 3: Slither outperforms the other tools in every category</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-25T00:35:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/screen-shot-2019-05-24-at-8.35.02-pm.png</image:loc><image:title>Screen Shot 2019-05-24 at 8.35.02 PM</image:title><image:caption>Fig. 2: An exploitable reentrant contract</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-25T00:50:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/screen-shot-2019-05-24-at-8.49.45-pm.png</image:loc><image:title>Screen Shot 2019-05-24 at 8.49.45 PM</image:title><image:caption>Fig. 2: An exploitable reentrant contract</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-25T01:13:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-25T01:14:39Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image2-1.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-25T01:14:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-25T01:15:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/image1-1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/30/announcing-automated-reverse-engineering-trainings/</loc><lastmod>2019-05-26T20:27:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/automated_re.png</image:loc><image:title>automated_re</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-27T22:47:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/05/overview.png</image:loc><image:title>overview_fixed</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/17/leaves-of-hash/</loc><lastmod>2019-06-17T10:51:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/69c2a-0yytrdra-6gguhezp.png</image:loc><image:title>69c2a-0yytrdra-6gguhezp</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/20/getting-2fa-right-in-2019/</loc><lastmod>2019-06-19T21:18:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/screen-shot-2019-06-19-at-5.17.52-pm.png</image:loc><image:title>Screen Shot 2019-06-19 at 5.17.52 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2019-06-24T20:35:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/image2.png</image:loc><image:title>image2</image:title><image:caption>High-level relationships between the clang frontend, LLVM IR, compiler-rt, and compiler driver</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2019-06-24T20:35:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/image5.png</image:loc><image:title>image5</image:title><image:caption>Dataflow of clang types throughout the code-generation process</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2019-06-24T20:36:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/image3.png</image:loc><image:title>image3</image:title><image:caption>Interactions between the pass manager and driver</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2019-06-24T20:36:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/06/image1.png</image:loc><image:title>image1</image:title><image:caption>Interactions between the transformation pass and runtime components</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/02/state/</loc><lastmod>2019-07-01T18:41:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/randomx.png</image:loc><image:title>randomx</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/03/avoiding-smart-contract-gridlock-with-slither/</loc><lastmod>2019-07-03T18:52:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image1.png</image:loc><image:title></image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2019-07-07T21:49:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image13.png</image:loc><image:title>image13</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2019-07-07T21:49:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image13-1.png</image:loc><image:title>image13</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2019-07-07T21:50:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image12.png</image:loc><image:title>image12</image:title><image:caption>Developers have even used e = 1, which doesn’t actually encrypt the plaintext</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2019-07-07T21:50:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image14.jpg</image:loc><image:title>image14</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T04:22:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image5.png</image:loc><image:title>image5</image:title><image:caption>Figure 1 from the PBFT paper, which calls the three phases of each round “pre-prepare,” “prepare,” and “commit.” The numbers represent network nodes and the arrows represent messages. Note how non-leader nodes 1 and 2 broadcast to all other nodes during the second and third phases.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T04:23:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image1-1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T04:24:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image2.png</image:loc><image:title>image2</image:title><image:caption>HotStuff’s liveness theorem</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T04:25:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/image4.png</image:loc><image:title>image4</image:title><image:caption>LibraBFT’s liveness theorem</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T04:30:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/state-machine-pdf.png</image:loc><image:title>state-machine-pdf</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/16/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/</loc><lastmod>2019-07-16T03:28:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/forrester-market-leader.png</image:loc><image:title>forrester-market-leader</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-16T13:17:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/librabft_liveness-2.png</image:loc><image:title>LibraBFT_liveness</image:title><image:caption>LibraBFT's liveness theorem</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/07/16/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/</loc><lastmod>2019-07-16T14:16:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/07/2019q2_midsize-cybersecurity-consulting-services_146475-1.png</image:loc><image:title>2019Q2_Midsize Cybersecurity Consulting Services_146475 (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T05:58:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T06:00:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image1.png</image:loc><image:title>image1</image:title><image:caption>Figure 2: Reports provide detailed information needed to understand and fix issues</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T06:02:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image3.png</image:loc><image:title>image3</image:title><image:caption>Figure 3: Crytic easily creates GitHub issues for selected reports</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T06:03:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image4.png</image:loc><image:title>image4</image:title><image:caption>Figure 4: Crytic is fully integrated with GitHub Pull Requests</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T00:56:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image10.png</image:loc><image:title>image10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T00:56:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image6.png</image:loc><image:title>image6</image:title><image:caption>The grey arrows represent application messages encrypted under a symmetric key.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:09:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image10-1.png</image:loc><image:title>image10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:09:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image6-1.png</image:loc><image:title>image6</image:title><image:caption>The grey arrows represent application messages encrypted under a symmetric key.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:10:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image2-1.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:10:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image6-2.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:11:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image8.png</image:loc><image:title>image8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:11:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image5.png</image:loc><image:title>image5</image:title><image:caption>The boxes with red slashes through them represent blank nodes.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:12:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image3-1.png</image:loc><image:title>image3</image:title><image:caption>The green circles indicate recently updated nodes.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:12:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image7.png</image:loc><image:title>image7</image:title><image:caption>The solid black arrows above indicate public-key encrypted messages. The dashed arrows indicate plaintext messages. The arrows do not indicate who is doing the sending (since that’s all Yolanda). They’re just meant to illustrate where in the tree the values are coming from and whom they’re intended for.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:13:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image9.png</image:loc><image:title>image9</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:14:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image1-1.png</image:loc><image:title>image1</image:title><image:caption>The green circles still represent the updated nodes. The solid arrows represent the private key of its tail being encrypted under the public key of its head.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T01:14:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image4-1.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/resf_orig/</loc><lastmod>2019-08-06T13:21:06Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/resf_orig.jpg</image:loc><image:title>resf</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/09/a-day-in-the-life-of-alessandro-gario-senior-security-engineer/</loc><lastmod>2019-08-06T19:22:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/unnamed.jpg</image:loc><image:title>unnamed</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-06T23:58:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image1-2.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:05:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image8.jpg</image:loc><image:title>image8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:08:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image12.png</image:loc><image:title>image12</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:09:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image9-1.png</image:loc><image:title>image9</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:09:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image6-3.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:10:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image10-2.png</image:loc><image:title>image10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:11:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image11.png</image:loc><image:title>image11</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:11:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image3-2.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:11:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image7-1.png</image:loc><image:title>image7</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:12:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image5-1.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:12:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image4-2.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T00:12:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/image2-2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-08T04:51:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/post_remove_tree.png</image:loc><image:title>post_remove_tree</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-25T15:35:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/binja1.jpg</image:loc><image:title>binja1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-25T15:39:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/binja2.jpg</image:loc><image:title>binja2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-25T15:56:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/binja3.jpg</image:loc><image:title>binja3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-25T15:59:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/binja4.jpg</image:loc><image:title>binja4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T14:56:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/screenshot-from-2019-08-09-15-11-26.png</image:loc><image:title>Screenshot from 2019-08-09 15-11-26</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T15:06:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/trent_edit.png</image:loc><image:title>trent_edit</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T15:25:46Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/trent_edits3.png</image:loc><image:title>trent_edits3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T15:41:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/inter_alias_nbc.png</image:loc><image:title>inter_alias_nbc</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T15:51:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/trent_edit2.png</image:loc><image:title>trent_edit2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T15:52:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/trent4.png</image:loc><image:title>trent4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-26T16:02:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/repro_c.png</image:loc><image:title>repro_c</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T17:44:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi_1.png</image:loc><image:title>aditi_1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T17:53:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi_2.png</image:loc><image:title>aditi_2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T18:43:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi_3.png</image:loc><image:title>aditi_3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T18:44:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi_4.png</image:loc><image:title>aditi_4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T18:45:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi_5.png</image:loc><image:title>aditi_5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-08-26T19:49:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/aditi.gif</image:loc><image:title>aditi</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T01:11:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_1.png</image:loc><image:title>alan_1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T01:14:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_2.png</image:loc><image:title>alan_2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T01:26:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_3.png</image:loc><image:title>alan_3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T01:28:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_4.png</image:loc><image:title>alan_4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T03:31:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_5.jpg</image:loc><image:title>alan_5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-08-27T03:33:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/08/alan_6.jpg</image:loc><image:title>alan_6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-09-03T13:42:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/anne_1-1.jpg</image:loc><image:title>anne_1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-09-03T13:57:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/anne_2.jpg</image:loc><image:title>anne_2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-09-03T14:02:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/anne_3.jpg</image:loc><image:title>anne_3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-09-03T14:09:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/anne_4.jpg</image:loc><image:title>anne_4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-09-03T14:17:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/codecogseqn-2.jpg</image:loc><image:title>CodeCogsEqn (2)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/11/crypto-2019-takeaways/</loc><lastmod>2019-09-11T05:28:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/image1.png</image:loc><image:title>image1</image:title><image:caption>Comparison of zero-knowledge protocols</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:20:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/dsc_6478.jpg</image:loc><image:title>DSC_6478</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:20:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/dsc_6480.jpg</image:loc><image:title>DSC_6480</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:21:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/dsc_6013.jpg</image:loc><image:title>DSC_6013</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:21:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/oss4119.jpg</image:loc><image:title>_OSS4119</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:21:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/dsc_5954.jpg</image:loc><image:title>DSC_5954</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-17T21:43:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/oss4146.jpg</image:loc><image:title>_OSS4146</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T18:33:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/screen-shot-2019-09-27-at-12.26.05-pm.png</image:loc><image:title>Screen Shot 2019-09-27 at 12.26.05 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T18:37:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/screen-shot-2019-09-27-at-1.51.33-pm.png</image:loc><image:title>Screen Shot 2019-09-27 at 1.51.33 PM</image:title><image:caption>When designing the SEP, Apple’s threat model included “adversarial” situations such as another Boot ROM exploit.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T18:43:19Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/screen-shot-2019-09-27-at-12.26.05-pm-1.png</image:loc><image:title>Screen Shot 2019-09-27 at 12.26.05 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T18:44:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/screen-shot-2019-09-27-at-12.26.05-pm-2.png</image:loc><image:title>Screen Shot 2019-09-27 at 12.26.05 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T18:50:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/09/screen-shot-2019-09-27-at-1.51.33-pm-1.png</image:loc><image:title>Screen Shot 2019-09-27 at 1.51.33 PM</image:title><image:caption>When designing the SEP, Apple’s threat model included “adversarial” situations such as another Boot ROM exploit.</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-50-21-pm/</loc><lastmod>2019-10-03T19:50:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.50.21-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.50.21-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-51-14-pm/</loc><lastmod>2019-10-03T19:51:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.51.14-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.51.14-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-52-37-pm/</loc><lastmod>2019-10-03T19:52:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.52.37-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.52.37-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-53-36-pm/</loc><lastmod>2019-10-03T19:54:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.53.36-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.53.36-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-53-51-pm/</loc><lastmod>2019-10-03T19:54:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.53.51-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.53.51-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-03-at-3-56-07-pm/</loc><lastmod>2019-10-03T19:58:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-03-at-3.56.07-pm.png</image:loc><image:title>screen-shot-2019-10-03-at-3.56.07-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-2-47-47-pm/</loc><lastmod>2019-10-23T18:48:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-2.47.47-pm.png</image:loc><image:title>screen-shot-2019-10-23-at-2.47.47-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-2-49-06-pm/</loc><lastmod>2019-10-23T21:10:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-2.49.06-pm-e1571865028304.png</image:loc><image:title>screen-shot-2019-10-23-at-2.49.06-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-2-52-11-pm/</loc><lastmod>2019-10-23T21:15:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-2.52.11-pm-e1571865339485.png</image:loc><image:title>screen-shot-2019-10-23-at-2.52.11-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-12-40-pm/</loc><lastmod>2019-10-23T21:19:18Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.12.40-pm-e1571865556754.png</image:loc><image:title>screen-shot-2019-10-23-at-3.12.40-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-16-54-pm/</loc><lastmod>2019-10-23T21:24:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.16.54-pm-e1571865853659.png</image:loc><image:title>screen-shot-2019-10-23-at-3.16.54-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-25-12-pm/</loc><lastmod>2019-10-23T21:28:08Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.25.12-pm-e1571866087320.png</image:loc><image:title>screen-shot-2019-10-23-at-3.25.12-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-26-10-pm/</loc><lastmod>2019-10-23T21:29:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.26.10-pm-e1571866179544.png</image:loc><image:title>screen-shot-2019-10-23-at-3.26.10-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-32-41-pm/</loc><lastmod>2019-10-23T19:32:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.32.41-pm.png</image:loc><image:title>screen-shot-2019-10-23-at-3.32.41-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/screen-shot-2019-10-23-at-3-34-08-pm/</loc><lastmod>2019-10-23T21:33:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-3.34.08-pm-e1571866407764.png</image:loc><image:title>screen-shot-2019-10-23-at-3.34.08-pm</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/</loc><lastmod>2019-10-23T21:07:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-5.07.03-pm.png</image:loc><image:title>Screen Shot 2019-10-23 at 5.07.03 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/</loc><lastmod>2019-10-23T22:24:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-6.24.48-pm.png</image:loc><image:title>Screen Shot 2019-10-23 at 6.24.48 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/</loc><lastmod>2019-10-23T22:26:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-23-at-6.26.41-pm.png</image:loc><image:title>Screen Shot 2019-10-23 at 6.26.41 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-29T14:30:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-28-at-5.27.09-pm.png</image:loc><image:title>Screen Shot 2019-10-28 at 5.27.09 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-29T14:36:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/image-2.png</image:loc><image:title>image (2)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-29T15:05:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/mishegos.png</image:loc><image:title>mishegos</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-29T15:10:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/untitled.png</image:loc><image:title>Untitled</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-29T15:20:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-11-at-5.23.54-pm.png</image:loc><image:title>Screen Shot 2019-10-11 at 5.23.54 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/</loc><lastmod>2019-10-29T23:48:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/screen-shot-2019-10-29-at-6.19.23-pm.png</image:loc><image:title>Screen Shot 2019-10-29 at 6.19.23 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/</loc><lastmod>2019-10-30T02:06:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/safebrowsing_icon.png</image:loc><image:title>SafeBrowsing_Icon</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/01/two-new-tools-that-tame-the-treachery-of-files/</loc><lastmod>2019-11-01T02:38:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/10/test.cast_.gif</image:loc><image:title>test.cast</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/polytracker_name/</loc><lastmod>2019-11-01T11:43:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/polytracker_name.png</image:loc><image:title>polytracker_name</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/07/attacking-go-vr-ttps/</loc><lastmod>2019-11-06T17:49:24Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/polyfile_name.png</image:loc><image:title>polyfile_name</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/14/introducing-iverify-the-security-toolkit-for-iphone-users/</loc><lastmod>2019-11-14T14:38:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/appstore.png</image:loc><image:title>appstore</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-26T07:22:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/scalarvector.png</image:loc><image:title>ScalarVector</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-26T07:42:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/singlecputhroughput.png</image:loc><image:title>SingleCPUThroughput</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-26T07:42:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/multicputhroughput.png</image:loc><image:title>MultiCPUThroughput</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-26T07:44:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/nvidiav100.png</image:loc><image:title>NVIDIAV100</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-26T07:44:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/11/cpugpugraph.png</image:loc><image:title>CPUGPUGraph</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2019/12/09/introducing-mainnet360-a-joint-economic-and-security-assessment-with-prysm-group/</loc><lastmod>2019-12-05T21:45:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2019/12/mainnet360header.png</image:loc><image:title>mainnet360header</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T01:23:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/ecc.png</image:loc><image:title>ecc</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T01:24:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/screen-shot-2020-01-15-at-8.23.28-pm.png</image:loc><image:title>Screen Shot 2020-01-15 at 8.23.28 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T03:17:22Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image-6.png</image:loc><image:title>image (6)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T03:20:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/cert.png</image:loc><image:title>cert</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T03:21:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/carbon-11.png</image:loc><image:title>carbon (11)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T04:24:23Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image-7.png</image:loc><image:title>image (7)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T04:40:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/carbon-12.png</image:loc><image:title>carbon (12)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image5.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image6.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-29T23:44:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/01/image7.png</image:loc><image:title>image7</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/</loc><lastmod>2020-03-03T19:09:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/</loc><lastmod>2020-03-03T19:09:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/</loc><lastmod>2020-03-03T19:13:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/screen-shot-2020-03-03-at-2.13.28-pm.png</image:loc><image:title>Screen Shot 2020-03-03 at 2.13.28 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:14:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/screen-shot-2020-01-27-at-3.58.53-pm.png</image:loc><image:title>Screen Shot 2020-01-27 at 3.58.53 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:15:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/ntfs0.png</image:loc><image:title>ntfs0</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:16:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/ntfs1.png</image:loc><image:title>ntfs1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:16:45Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/ntfs2.png</image:loc><image:title>ntfs2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:17:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/ntfs3.png</image:loc><image:title>ntfs3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:18:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/ntfs4.png</image:loc><image:title>ntfs4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:19:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/carbon.png</image:loc><image:title>carbon</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-04T21:20:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/carbon-2.png</image:loc><image:title>carbon (2)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/</loc><lastmod>2020-03-20T07:24:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/screen-shot-2020-03-20-at-12.24.03-am.png</image:loc><image:title>Screen Shot 2020-03-20 at 12.24.03 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/</loc><lastmod>2020-03-20T07:29:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/screen-shot-2020-03-20-at-12.29.04-am.png</image:loc><image:title>Screen Shot 2020-03-20 at 12.29.04 AM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/</loc><lastmod>2020-03-20T07:53:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/logo.png</image:loc><image:title>logo</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-26T16:18:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image5.png</image:loc><image:title>An assertion failure is discovered in Vera's MakerDAO example.</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-26T16:20:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-26T16:21:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-26T16:21:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image1-1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-26T16:22:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/03/image2-1.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/07/announcing-our-first-virtual-empire-hacking/</loc><lastmod>2020-04-07T06:35:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/euxxek2xgaiebor.jpeg</image:loc><image:title>EUXXEK2XgAIeBor</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T18:30:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/asm.png</image:loc><image:title>asm</image:title><image:caption>ASM (interactive version)</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T18:31:07Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/mlil.png</image:loc><image:title>mlil</image:title><image:caption>MLIL (interactive version)</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T18:30:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/llil.png</image:loc><image:title>llil</image:title><image:caption>LLIL (interactive version)</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T18:31:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/hlil.png</image:loc><image:title>hlil</image:title><image:caption>HLIL</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T18:31:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/04/hlil-linear.png</image:loc><image:title>hlil-linear</image:title><image:caption>HLIL Linear View</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:19:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_1.png</image:loc><image:title>issue_1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:19:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_2.png</image:loc><image:title>issue_2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:20:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_3.png</image:loc><image:title>issue_3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:20:03Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_4.png</image:loc><image:title>issue_4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:28:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_5.png</image:loc><image:title>issue_5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:28:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_6.png</image:loc><image:title>issue_6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:28:42Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_7.png</image:loc><image:title>issue_7</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:28:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_8.png</image:loc><image:title>issue_8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-14T09:28:50Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/issue_9.png</image:loc><image:title>issue_9</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-20T22:00:41Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/memory-proof-1.png</image:loc><image:title>Memory Proof (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-20T22:01:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/memory-proof-1-1.png</image:loc><image:title>Memory Proof (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-20T22:03:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/trace-proof-1.png</image:loc><image:title>Trace Proof (1)</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-20T22:06:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/circuits.png</image:loc><image:title>circuits</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/</loc><lastmod>2020-05-22T03:02:27Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/</loc><lastmod>2020-05-22T03:03:11Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/</loc><lastmod>2020-05-22T03:03:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:15:18Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/svcli.png</image:loc><image:title>svcli</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:20:16Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/authenticode-signeddata.png</image:loc><image:title>authenticode-signeddata</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:30:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/win_certificate.png.png</image:loc><image:title>win_certificate.png</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:33:02Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/spc_indirect.png</image:loc><image:title>spc_indirect</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:35:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/spc_indirect_macros.png</image:loc><image:title>spc_indirect_macros</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:38:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/verify1.png</image:loc><image:title>verify1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:39:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/verify2.png</image:loc><image:title>verify2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:40:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/authenticode_digest.png</image:loc><image:title>authenticode_digest</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:42:48Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/page_hash_asn1.png</image:loc><image:title>page_hash_asn1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:44:05Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/page_hash.png</image:loc><image:title>page_hash</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:45:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/timestamp_asn1.png</image:loc><image:title>timestamp_asn1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-26T14:46:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/05/uthenticode_example.png</image:loc><image:title>uthenticode_example</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/05/breaking-the-solidity-compiler-with-a-fuzzer/</loc><lastmod>2020-06-05T03:29:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/issuegraph.png</image:loc><image:title>issuegraph</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T05:01:38Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/screen-shot-2020-04-24-at-4.19.11-pm.png</image:loc><image:title>Screen Shot 2020-04-24 at 4.19.11 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T05:02:04Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/screen-shot-2020-04-25-at-2.32.39-pm.png</image:loc><image:title>Screen Shot 2020-04-25 at 2.32.39 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T05:02:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/screen-shot-2020-04-25-at-7.22.01-pm.png</image:loc><image:title>Screen Shot 2020-04-25 at 7.22.01 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T05:02:37Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/screen-shot-2020-04-27-at-9.44.49-pm.png</image:loc><image:title>Screen Shot 2020-04-27 at 9.44.49 PM</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T05:02:52Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/pasted-image-0.png</image:loc><image:title>pasted image 0</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-12T01:59:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-12T01:59:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-12T02:00:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-12T02:00:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/06/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/android-chrome-512x512/</loc><lastmod>2020-07-09T20:03:49Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/07/android-chrome-512x512-1.png</image:loc><image:title>android-chrome-512x512</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/cropped-android-chrome-512x512-1-png/</loc><lastmod>2020-07-09T20:03:54Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/07/cropped-android-chrome-512x512-1.png</image:loc><image:title>cropped-android-chrome-512x512-1.png</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image1-38/</loc><lastmod>2020-08-17T03:36:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/08/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image2-33/</loc><lastmod>2020-08-17T03:37:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/08/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/2020/08/28/graphtage/</loc><lastmod>2020-08-28T02:19:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/08/example.png</image:loc><image:title>Graphtage Example</image:title><image:caption>An example of Graphtage's output</image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image1-39/</loc><lastmod>2020-10-08T02:42:10Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image2-34/</loc><lastmod>2020-10-08T02:42:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image2.png</image:loc><image:title>image2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image3-24/</loc><lastmod>2020-10-08T02:42:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image3.png</image:loc><image:title>image3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image4-17/</loc><lastmod>2020-10-08T02:42:14Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image4.png</image:loc><image:title>image4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image5-12/</loc><lastmod>2020-10-08T02:42:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image5.png</image:loc><image:title>image5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image6-9/</loc><lastmod>2020-10-08T02:42:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image6.png</image:loc><image:title>image6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/image1-40/</loc><lastmod>2020-10-08T05:08:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/image1-1.png</image:loc><image:title>image1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-1/</loc><lastmod>2020-10-21T07:24:51Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-1.png</image:loc><image:title>GPU Fuzzer 1</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-2/</loc><lastmod>2020-10-21T07:24:53Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-2.png</image:loc><image:title>GPU Fuzzer 2</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-3/</loc><lastmod>2020-10-21T07:24:55Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-3.png</image:loc><image:title>GPU Fuzzer 3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-4/</loc><lastmod>2020-10-21T07:24:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-4.png</image:loc><image:title>GPU Fuzzer 4</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-5/</loc><lastmod>2020-10-21T07:24:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-5.png</image:loc><image:title>GPU Fuzzer 5</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-6/</loc><lastmod>2020-10-21T07:24:57Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-6.jpg</image:loc><image:title>GPU Fuzzer 6</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-7/</loc><lastmod>2020-10-21T07:24:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-7.png</image:loc><image:title>GPU Fuzzer 7</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-8/</loc><lastmod>2020-10-21T07:24:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-8.png</image:loc><image:title>GPU Fuzzer 8</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-9/</loc><lastmod>2020-10-21T07:24:58Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-9.png</image:loc><image:title>GPU Fuzzer 9</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-10/</loc><lastmod>2020-10-21T07:24:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-10.jpg</image:loc><image:title>GPU Fuzzer 10</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-11/</loc><lastmod>2020-10-21T07:25:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-11.png</image:loc><image:title>GPU Fuzzer 11</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-12/</loc><lastmod>2020-10-21T07:25:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-12.png</image:loc><image:title>GPU Fuzzer 12</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-13/</loc><lastmod>2020-10-21T07:25:00Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-13.png</image:loc><image:title>GPU Fuzzer 13</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/gpu-fuzzer-14/</loc><lastmod>2020-10-21T07:25:01Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/GPU-Fuzzer-14.jpg</image:loc><image:title>GPU Fuzzer 14</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/ryaneberhardt_ehtalk-m4v/</loc><lastmod>2020-10-21T08:18:44Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/ryaneberhardt_ehtalk_std.original.jpg</image:loc><image:title>ryaneberhardt_ehtalk_std.original</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-1-exploring-program-behaviors/</loc><lastmod>2020-10-22T15:48:13Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-1-exploring-program-behaviors.png</image:loc><image:title>white-1-exploring-program-behaviors</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-2-how-fuzzing-works/</loc><lastmod>2020-10-22T15:48:17Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-2-how-fuzzing-works.png</image:loc><image:title>white-2-how-fuzzing-works</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-3-remill/</loc><lastmod>2020-10-22T15:48:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-3-remill.png</image:loc><image:title>white-3-remill</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-4-memory-management/</loc><lastmod>2020-10-22T15:48:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-4-memory-management.png</image:loc><image:title>white-4-memory-management</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-5-intrinsics-compilation/</loc><lastmod>2020-10-22T15:48:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-5-intrinsics-compilation.png</image:loc><image:title>white-5-intrinsics-compilation</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-6-not-interleaved-memory/</loc><lastmod>2020-10-22T15:48:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-6-not-interleaved-memory.png</image:loc><image:title>white-6-not-interleaved-memory</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-7-interleaved/</loc><lastmod>2020-10-22T15:48:36Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-7-interleaved.png</image:loc><image:title>white-7-interleaved</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-8-synchronous/</loc><lastmod>2020-10-22T15:48:40Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-8-synchronous.png</image:loc><image:title>white-8-synchronous</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/white-9-asynchronous/</loc><lastmod>2020-10-22T15:48:43Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/white-9-asynchronous.png</image:loc><image:title>white-9-asynchronous</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/asynchronous/</loc><lastmod>2020-10-22T16:07:15Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/asynchronous.png</image:loc><image:title>asynchronous</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/exploring-program-behaviors/</loc><lastmod>2020-10-22T16:07:18Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/exploring-program-behaviors.png</image:loc><image:title>exploring-program-behaviors</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/graphs-001/</loc><lastmod>2020-10-22T16:07:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/graphs.001.jpeg</image:loc><image:title>graphs.001</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/graphs-002/</loc><lastmod>2020-10-22T16:07:25Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/graphs.002.jpeg</image:loc><image:title>graphs.002</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/graphs-003/</loc><lastmod>2020-10-22T16:07:28Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/graphs.003.jpeg</image:loc><image:title>graphs.003</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/how-fuzzing-works/</loc><lastmod>2020-10-22T16:07:29Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/how-fuzzing-works.png</image:loc><image:title>how-fuzzing-works</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/interleaved/</loc><lastmod>2020-10-22T16:07:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/interleaved.png</image:loc><image:title>interleaved</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/intrinsics-compilation/</loc><lastmod>2020-10-22T16:07:30Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/intrinsics-compilation.png</image:loc><image:title>intrinsics-compilation</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/memory-management/</loc><lastmod>2020-10-22T16:07:31Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/memory-management.png</image:loc><image:title>memory-management</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/not-interleaved-memory/</loc><lastmod>2020-10-22T16:07:32Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/not-interleaved-memory.png</image:loc><image:title>not-interleaved-memory</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/profile-interleaved/</loc><lastmod>2020-10-22T16:07:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/profile-interleaved.png</image:loc><image:title>profile-interleaved</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/profile-master/</loc><lastmod>2020-10-22T16:07:34Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/profile-master.png</image:loc><image:title>profile-master</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/remill/</loc><lastmod>2020-10-22T16:07:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/remill.png</image:loc><image:title>remill</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/synchronous/</loc><lastmod>2020-10-22T16:07:35Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/synchronous.png</image:loc><image:title>synchronous</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/slither-simil-process-workflow-3/</loc><lastmod>2020-10-22T19:58:09Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/Slither-simil-Process-Workflow-3.png</image:loc><image:title>Slither-simil Process Workflow-3</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/vectors-of-slithr-tokens/</loc><lastmod>2020-10-22T19:58:12Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/vectors-of-Slithr-tokens.png</image:loc><image:title>vectors of Slithr tokens</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/vuln-pie-chart/</loc><lastmod>2020-10-22T21:08:21Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/vuln-pie-chart.png</image:loc><image:title>vuln pie chart</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/diamond3/</loc><lastmod>2020-10-30T10:56:59Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/diamond3.jpg</image:loc><image:title>Storage pointer representation.</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/diamond2/</loc><lastmod>2020-10-30T10:55:47Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/diamond2.jpg</image:loc><image:title>delegatecall-based upgradeability with multiple implementations.</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/diamond1/</loc><lastmod>2020-10-30T10:54:56Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/diamond1.jpg</image:loc><image:title>delegatecall-based upgradeability with a single implementation</image:title><image:caption></image:caption></image:image></url><url><loc>https://blog.trailofbits.com/diamond3-2/</loc><lastmod>2020-10-30T17:47:33Z</lastmod><image:image><image:loc>https://blog.trailofbits.com/wp-content/uploads/2020/10/diamond3-1.jpg</image:loc><image:title>Storage pointer representation.</image:title><image:caption></image:caption></image:image></url></urlset>