<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-9.0.2'-->
<?xml-stylesheet type="text/xsl" href="//blog.trailofbits.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.trailofbits.com</loc></url><url><loc>https://blog.trailofbits.com/2012/06/11/analyzing-the-md5-collision-in-flame/</loc><lastmod>2016-12-11T22:21:02Z</lastmod></url><url><loc>https://blog.trailofbits.com/2012/10/29/ending-the-love-affair-with-exploitshield/</loc><lastmod>2020-10-18T19:20:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/13/elderwood-and-the-department-of-labor-hack/</loc><lastmod>2017-01-12T19:10:49Z</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/14/writing-exploits-with-the-elderwood-kit-part-1/</loc><lastmod>2016-05-08T16:46:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/20/writing-exploits-with-the-elderwood-kit-part-2/</loc><lastmod>2016-05-08T16:47:38Z</lastmod></url><url><loc>https://blog.trailofbits.com/2013/06/03/free-ruby-security-workshop/</loc><lastmod>2016-12-11T22:35:21Z</lastmod></url><url><loc>https://blog.trailofbits.com/2013/07/24/iverify-is-now-available-on-github/</loc><lastmod>2017-10-10T21:04:40Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/02/23/semantic-analysis-of-native-programs-introducing-codereason/</loc><lastmod>2019-07-23T20:51:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/02/24/introducing-javelin/</loc><lastmod>2016-12-11T22:34:07Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/04/27/using-static-analysis-and-clang-to-find-heartbleed/</loc><lastmod>2019-07-22T05:08:51Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/05/20/trail-of-bits-releases-the-capture-the-flag-field-guide/</loc><lastmod>2019-07-23T20:51:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/03/dear-darpa-challenge-accepted/</loc><lastmod>2019-07-23T20:50:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/04/weve-moved/</loc><lastmod>2014-06-04T18:26:06Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/</loc><lastmod>2017-03-14T02:50:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/15/trail-of-bits-adds-mobile-security-researcher-nicholas-depetrillo-to-growing-team/</loc><lastmod>2014-07-15T03:11:34Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/28/education-initiative-spotlight-csaw-summer-program-for-women/</loc><lastmod>2016-12-11T23:08:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/30/education-initiative-spotlight-build-it-break-it/</loc><lastmod>2016-12-11T22:29:23Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/01/education-initiative-spotlight-threads-call-for-papers/</loc><lastmod>2016-12-11T22:29:35Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/07/mcsema-is-officially-open-source/</loc><lastmod>2019-07-23T20:51:12Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/</loc><lastmod>2019-07-23T20:51:09Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2016-12-11T22:25:06Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2016-12-11T22:23:32Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/10/02/threads-14-scaling-security/</loc><lastmod>2019-07-23T20:51:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/</loc><lastmod>2019-07-23T20:51:02Z</lastmod></url><url><loc>https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/</loc><lastmod>2017-03-14T02:49:34Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/01/05/the-foundation-of-2015-2014-in-review/</loc><lastmod>2016-12-11T22:52:18Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/05/05/empire-hacking/</loc><lastmod>2016-12-11T23:16:13Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/05/13/closing-the-windows-gap/</loc><lastmod>2016-12-11T22:51:33Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/06/08/introducing-the-rubysec-field-guide/</loc><lastmod>2016-12-11T22:51:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2018-08-17T15:38:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2019-07-23T20:50:58Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2017-02-19T15:26:22Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/09/10/summer-trail-of-bits/</loc><lastmod>2017-04-28T18:15:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2016-12-11T22:45:51Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/10/30/why-we-give-so-much-to-csaw/</loc><lastmod>2016-12-11T22:44:52Z</lastmod></url><url><loc>https://blog.trailofbits.com/2015/12/15/self-hosted-video-chat-with-tuber/</loc><lastmod>2016-12-11T22:44:32Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/05/lets-encrypt-the-internet/</loc><lastmod>2016-12-11T22:44:18Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/07/2015-in-review/</loc><lastmod>2016-12-11T22:43:56Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/</loc><lastmod>2016-12-11T22:43:41Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/04/join-us-at-code-as-craft/</loc><lastmod>2017-02-19T15:25:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/02/software-security-ideas-ahead-of-their-time/</loc><lastmod>2016-02-02T14:58:30Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/</loc><lastmod>2016-12-11T22:40:25Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/</loc><lastmod>2016-12-11T23:02:00Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</loc><lastmod>2019-07-23T20:50:27Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/04/01/hacker-handle-bounty/</loc><lastmod>2016-04-05T14:02:52Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2019-05-31T21:11:33Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/19/empire-hacking-turns-one/</loc><lastmod>2017-11-21T02:52:26Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/18/protofuzz-a-protobuf-fuzzer/</loc><lastmod>2016-12-28T16:52:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-12-11T23:00:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T22:17:20Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/28/start-using-the-secure-enclave-crypto-api/</loc><lastmod>2016-12-11T23:03:22Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/</loc><lastmod>2018-08-24T00:31:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/01/your-tool-works-better-than-mine-prove-it/</loc><lastmod>2019-07-23T20:50:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/02/engineering-solutions-to-hard-program-analysis-problems/</loc><lastmod>2019-07-23T20:50:22Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/09/work-for-us-fall-and-winter-internship-opportunities/</loc><lastmod>2020-04-24T02:19:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/09/12/plug-into-new-yorks-infosec-community/</loc><lastmod>2016-09-16T14:07:47Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/</loc><lastmod>2017-11-21T02:50:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/04/first-ever-automated-code-audit/</loc><lastmod>2016-12-11T23:09:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/</loc><lastmod>2019-08-16T13:56:21Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/26/come-find-us-at-oreilly-security/</loc><lastmod>2016-12-11T23:15:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/</loc><lastmod>2019-07-23T20:50:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/</loc><lastmod>2019-06-17T02:00:17Z</lastmod></url><url><loc>https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/</loc><lastmod>2017-03-01T03:43:53Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/01/09/2016-year-in-review/</loc><lastmod>2017-02-18T17:58:51Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2018-06-05T20:37:20Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-08-14T22:01:31Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/</loc><lastmod>2019-07-23T20:50:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-11-21T02:50:50Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/03/14/mcsema-im-liftin-it/</loc><lastmod>2019-07-23T20:50:14Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/03/23/april-means-infiltrate/</loc><lastmod>2017-03-22T19:10:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/04/14/a-walk-down-memory-lane/</loc><lastmod>2019-05-31T21:10:25Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/04/27/manticore-symbolic-execution-for-humans/</loc><lastmod>2017-08-10T16:19:02Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/05/15/magic-with-manticore/</loc><lastmod>2017-05-15T21:14:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/</loc><lastmod>2017-08-02T17:13:38Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/08/02/microsoft-didnt-sandbox-windows-defender-so-i-did/</loc><lastmod>2019-07-03T04:49:36Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2018-01-19T04:31:18Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/12/ios-jailbreak-detection-toolkit-now-available/</loc><lastmod>2017-10-12T18:44:43Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T18:22:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/19/trail-of-bits-joins-the-enterprise-ethereum-alliance/</loc><lastmod>2018-05-10T03:58:39Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/06/hands-on-the-ethernaut-ctf/</loc><lastmod>2018-07-31T05:47:54Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/09/how-are-teams-currently-using-osquery/</loc><lastmod>2017-11-09T14:40:35Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/22/securing-ethereum-at-empire-hacking/</loc><lastmod>2017-12-12T16:58:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/14/announcing-the-trail-of-bits-osquery-extension-repository/</loc><lastmod>2017-12-15T19:02:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/21/osquery-pain-points/</loc><lastmod>2017-12-22T13:39:53Z</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/22/videos-from-ethereum-focused-empire-hacking/</loc><lastmod>2018-01-01T17:14:35Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/</loc><lastmod>2018-01-23T17:03:54Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-06-20T21:35:52Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/02/09/parity-technologies-engages-trail-of-bits/</loc><lastmod>2018-03-08T01:37:40Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/08/2017-in-review/</loc><lastmod>2018-03-08T23:41:39Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/09/echidna-a-smart-fuzzer-for-ethereum/</loc><lastmod>2018-03-09T18:52:15Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/</loc><lastmod>2018-03-16T13:36:25Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-08-04T04:51:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/23/use-our-suite-of-ethereum-security-tools/</loc><lastmod>2018-10-19T19:55:31Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-04-04T17:10:54Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/06/how-to-prepare-for-a-security-audit/</loc><lastmod>2018-07-24T18:25:15Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/10/what-do-you-wish-osquery-could-do/</loc><lastmod>2018-04-10T05:55:18Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/03/state-machine-testing-with-echidna/</loc><lastmod>2018-05-07T20:09:37Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/</loc><lastmod>2018-05-31T15:49:04Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/29/manage-santa-within-osquery/</loc><lastmod>2018-05-29T04:04:09Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/</loc><lastmod>2018-05-30T15:06:46Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/</loc><lastmod>2018-07-09T19:31:34Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/27/announcing-the-trail-of-bits-osquery-support-group/</loc><lastmod>2018-06-27T03:57:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/29/trail-of-bits-donates-100000-to-support-young-researchers-through-summercon/</loc><lastmod>2018-06-30T13:13:28Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T14:01:20Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/01/bluetooth-invalid-curve-points/</loc><lastmod>2019-12-04T13:59:35Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T16:39:52Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/23/introducing-windows-acl-working-with-acls-in-rust/</loc><lastmod>2018-08-23T01:06:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/22/get-an-open-source-security-multiplier/</loc><lastmod>2019-03-15T00:47:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/06/rattle-an-ethereum-evm-binary-analysis-framework/</loc><lastmod>2018-09-06T06:25:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-10T19:02:10Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2019-07-23T20:50:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/26/effortless-security-feature-detection-with-winchecksec/</loc><lastmod>2018-09-27T01:22:04Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/04/ethereum-security-guidance-for-all/</loc><lastmod>2018-10-22T19:27:43Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/05/how-to-spot-good-fuzzing-research/</loc><lastmod>2019-05-31T21:09:12Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/12/introduction-to-verifiable-delay-functions-vdfs/</loc><lastmod>2018-12-09T05:12:55Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-12-18T04:29:13Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2019-10-17T07:59:37Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2019-07-23T20:50:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/29/how-contract-migration-works/</loc><lastmod>2018-11-15T15:44:37Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/07/we-crypto-now/</loc><lastmod>2018-11-07T11:38:49Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/16/trail-of-bits-devcon-iv-recap/</loc><lastmod>2018-11-16T06:15:17Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/19/return-of-the-blockchain-security-empire-hacking/</loc><lastmod>2018-12-10T20:36:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T22:14:43Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/17/csaw-ctf-crypto-challenge-breaking-dsa/</loc><lastmod>2018-12-19T00:32:47Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/</loc><lastmod>2020-03-16T15:22:20Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/20/10000-research-fellowships-for-underrepresented-talent/</loc><lastmod>2018-12-20T15:00:32Z</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/31/fuzzing-like-its-1989/</loc><lastmod>2018-12-31T06:26:00Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-03T03:49:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/</loc><lastmod>2019-03-01T22:23:56Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/18/empire-hacking-ethereum-edition-2/</loc><lastmod>2019-01-18T16:10:33Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/</loc><lastmod>2019-01-28T22:28:59Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/</loc><lastmod>2019-06-17T16:58:27Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/23/fuzzing-an-api-with-deepstate-part-2/</loc><lastmod>2019-12-01T23:19:26Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/</loc><lastmod>2019-01-25T02:39:33Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/03/28/fuzzing-in-the-year-2000/</loc><lastmod>2019-03-31T14:43:41Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/03/25/what-application-developers-need-to-know-about-tls-early-data-0rtt/</loc><lastmod>2020-02-26T08:54:30Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/</loc><lastmod>2019-04-09T17:50:36Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T19:24:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/09/announcing-querycon-2019/</loc><lastmod>2019-04-08T17:20:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/</loc><lastmod>2019-04-18T16:24:51Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-28T11:24:18Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-31T10:03:25Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/30/announcing-automated-reverse-engineering-trainings/</loc><lastmod>2019-09-25T22:49:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/31/fuzzing-unit-tests-with-deepstate-and-eclipser/</loc><lastmod>2019-05-31T14:50:06Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/07/announcing-manticore-0-3-0/</loc><lastmod>2019-06-07T03:27:26Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/17/leaves-of-hash/</loc><lastmod>2019-06-17T19:45:09Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/18/why-you-should-go-to-querycon-this-week/</loc><lastmod>2019-06-18T14:27:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/19/trail-of-bits-icse-2019-recap/</loc><lastmod>2019-06-20T02:42:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/20/getting-2fa-right-in-2019/</loc><lastmod>2020-03-16T15:32:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2020-03-02T15:01:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/26/panicking-the-right-way-in-go/</loc><lastmod>2019-07-19T22:01:43Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/27/use-constexpr-for-faster-smaller-and-safer-code/</loc><lastmod>2019-07-03T13:55:10Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/16/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/</loc><lastmod>2019-12-19T09:24:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/01/siderophile-expose-your-crates-unsafety/</loc><lastmod>2019-07-01T15:26:57Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/02/state/</loc><lastmod>2019-07-04T04:41:21Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/03/avoiding-smart-contract-gridlock-with-slither/</loc><lastmod>2019-07-04T05:30:34Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2020-02-28T05:15:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-16T19:23:53Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/</loc><lastmod>2019-07-31T16:26:36Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T06:11:42Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-08T05:11:48Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/09/a-day-in-the-life-of-alessandro-gario-senior-security-engineer/</loc><lastmod>2019-08-06T23:36:50Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/08/246-findings-from-our-smart-contract-audits-an-executive-summary/</loc><lastmod>2019-08-08T10:36:58Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-15T16:45:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/26/wrappers-delight/</loc><lastmod>2019-08-26T06:08:53Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-29T06:13:52Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-09-03T22:00:04Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-09-05T16:21:36Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-09-03T15:05:22Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-10-24T20:32:12Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/11/crypto-2019-takeaways/</loc><lastmod>2019-09-11T05:29:23Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-20T13:26:28Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-28T04:18:15Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/03/tsc-frequency-for-all-better-profiling-and-benchmarking/</loc><lastmod>2019-12-31T15:41:13Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/04/multi-party-computation-on-machine-learning/</loc><lastmod>2019-10-04T14:19:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/</loc><lastmod>2019-10-24T03:59:55Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/29/grace-hopper-celebration-2019/</loc><lastmod>2019-10-29T15:19:29Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-31T15:39:17Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/</loc><lastmod>2019-10-31T03:04:35Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/01/two-new-tools-that-tame-the-treachery-of-files/</loc><lastmod>2019-11-01T11:49:26Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/07/attacking-go-vr-ttps/</loc><lastmod>2019-11-28T01:25:13Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/11/test-case-reduction/</loc><lastmod>2019-11-08T17:53:41Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/13/announcing-the-crytic-10k-research-prize/</loc><lastmod>2019-11-13T13:39:44Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/14/introducing-iverify-the-security-toolkit-for-iphone-users/</loc><lastmod>2019-11-19T16:59:46Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-12-09T03:12:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2019/12/09/introducing-mainnet360-a-joint-economic-and-security-assessment-with-prysm-group/</loc><lastmod>2019-12-09T03:14:12Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-29T13:39:56Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/23/themes-from-real-world-crypto-2020/</loc><lastmod>2020-01-22T16:16:42Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-31T16:35:34Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/</loc><lastmod>2020-03-04T17:17:09Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-16T11:12:42Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/13/our-full-report-on-the-voatz-mobile-voting-platform/</loc><lastmod>2020-05-10T02:32:15Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/18/financial-cryptography-2020-recap/</loc><lastmod>2020-03-20T17:15:46Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/</loc><lastmod>2020-03-20T08:07:39Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-30T02:28:12Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/07/announcing-our-first-virtual-empire-hacking/</loc><lastmod>2020-04-07T14:45:38Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T21:10:45Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/23/announcing-the-1st-international-workshop-on-smart-contract-analysis/</loc><lastmod>2020-06-17T22:17:32Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-15T14:24:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-21T05:07:27Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/</loc><lastmod>2020-05-22T20:14:50Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-27T13:51:05Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/29/detecting-bad-openssl-usage/</loc><lastmod>2020-05-29T02:42:32Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/05/breaking-the-solidity-compiler-with-a-fuzzer/</loc><lastmod>2020-06-05T03:29:41Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/09/how-to-check-if-a-mutex-is-locked-in-go/</loc><lastmod>2020-06-09T12:18:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-16T19:44:56Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-18T17:52:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/17/advocating-for-change/</loc><lastmod>2020-10-01T15:50:10Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/07/12/new-manticore-verifier-for-smart-contracts/</loc><lastmod>2020-07-12T19:40:58Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/05/accidentally-stepping-on-a-defi-lego/</loc><lastmod>2020-08-05T13:12:13Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/12/sinter-new-user-mode-security-enforcement-for-macos/</loc><lastmod>2020-08-12T05:41:16Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/17/using-echidna-to-test-a-smart-contract-library/</loc><lastmod>2020-10-27T15:58:08Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/28/graphtage/</loc><lastmod>2020-08-29T16:47:24Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/08/privacyraven-has-left-the-nest/</loc><lastmod>2020-10-14T04:25:10Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/09/detecting-iterator-invalidation-with-codeql/</loc><lastmod>2020-10-14T04:24:54Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/14/osquery-using-d-bus-to-query-systemd-data/</loc><lastmod>2020-10-26T16:02:19Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/22/lets-build-a-high-performance-fuzzer-with-gpus/</loc><lastmod>2020-10-22T16:27:07Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/23/efficient-audits-with-machine-learning-and-slither-simil/</loc><lastmod>2020-10-23T17:11:11Z</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/30/good-idea-bad-design-how-the-diamond-standard-falls-short/</loc><lastmod>2020-11-05T19:21:20Z</lastmod></url></urlset>
