<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.trailofbits.com/2026/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/c/c++/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/kyle-elliott/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/llvm/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/open-source/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/research-practice/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/reversing/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/04/03/simplifying-mba-obfuscation-with-cobra/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/tool-release/</loc><lastmod>2026-04-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/blockchain/</loc><lastmod>2026-04-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/bo-henderson/</loc><lastmod>2026-04-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/04/01/mutation-testing-for-the-agentic-era/</loc><lastmod>2026-04-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/mutation-testing/</loc><lastmod>2026-04-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/ai/</loc><lastmod>2026-03-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/dan-guido/</loc><lastmod>2026-03-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/03/31/how-we-made-trail-of-bits-ai-native-so-far/</loc><lastmod>2026-03-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/artificial-intelligence/</loc><lastmod>2026-03-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/benjamin-samuels/</loc><lastmod>2026-03-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/large-language-models/</loc><lastmod>2026-03-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/03/25/try-our-new-dimensional-analysis-claude-plugin/</loc><lastmod>2026-03-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/coriolan-pinhas/</loc><lastmod>2026-03-24T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/guides/</loc><lastmod>2026-03-24T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/03/24/spotting-issues-in-defi-with-dimensional-analysis/</loc><lastmod>2026-03-24T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/ethereum/</loc><lastmod>2026-03-11T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/03/11/six-mistakes-in-erc-4337-smart-accounts/</loc><lastmod>2026-03-11T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/vulnerabilities/</loc><lastmod>2026-03-11T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alessandro-gario/</loc><lastmod>2026-02-25T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/linux/</loc><lastmod>2026-02-25T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/memory-safety/</loc><lastmod>2026-02-25T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/02/25/mquire-linux-memory-forensics-without-external-dependencies/</loc><lastmod>2026-02-25T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/audits/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/machine-learning/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/prompt-injection/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/threat-modeling/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/trail-of-bits/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/02/20/using-threat-modeling-and-prompt-injection-to-audit-comet/</loc><lastmod>2026-02-20T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/02/18/carelessness-versus-craftsmanship-in-cryptography/</loc><lastmod>2026-02-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/cryptography/</loc><lastmod>2026-02-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/opal-wright/</loc><lastmod>2026-02-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/vulnerability-disclosure/</loc><lastmod>2026-02-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/01/30/celebrating-our-2025-open-source-contributions/</loc><lastmod>2026-01-30T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/compilers/</loc><lastmod>2026-01-30T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/emilio-l%C3%B3pez/</loc><lastmod>2026-01-30T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/supply-chain/</loc><lastmod>2026-01-30T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/01/29/building-cryptographic-agility-into-sigstore/</loc><lastmod>2026-01-29T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/riccardo-schirone/</loc><lastmod>2026-01-29T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/attacks/</loc><lastmod>2026-01-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/exploits/</loc><lastmod>2026-01-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2026/01/13/lack-of-isolation-in-agentic-browsers-resurfaces-old-vulnerabilities/</loc><lastmod>2026-01-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/lucas-bourtoule/</loc><lastmod>2026-01-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/</loc><lastmod>2025-12-31T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/31/detect-gos-silent-arithmetic-bugs-with-go-panikint/</loc><lastmod>2025-12-31T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/go/</loc><lastmod>2025-12-31T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/kevin-valerio/</loc><lastmod>2025-12-31T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/19/can-chatbots-craft-correct-code/</loc><lastmod>2025-12-19T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/engineering-practice/</loc><lastmod>2025-12-19T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/evan-sultanik/</loc><lastmod>2025-12-19T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/program-analysis/</loc><lastmod>2025-12-19T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/dominik-czarnota/</loc><lastmod>2025-12-16T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/dominik-klemba/</loc><lastmod>2025-12-16T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/mitigations/</loc><lastmod>2025-12-16T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/16/use-gwp-asan-to-detect-exploits-in-production-environments/</loc><lastmod>2025-12-16T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/12/catching-malicious-package-releases-using-a-transparency-log/</loc><lastmod>2025-12-12T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/ecosystem-security/</loc><lastmod>2025-12-12T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/facundo-tuesca/</loc><lastmod>2025-12-12T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/codeql/</loc><lastmod>2025-12-11T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/11/introducing-mrva-a-terminal-first-approach-to-codeql-multi-repo-variant-analysis/</loc><lastmod>2025-12-11T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/matt-schwager/</loc><lastmod>2025-12-11T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/static-analysis/</loc><lastmod>2025-12-11T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/12/02/introducing-constant-time-support-for-llvm-to-protect-cryptographic-code/</loc><lastmod>2025-12-02T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/julius-alexandre/</loc><lastmod>2025-12-02T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/internship-projects/</loc><lastmod>2025-11-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/markus-schiffermuller/</loc><lastmod>2025-11-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/</loc><lastmod>2025-11-18T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/11/15/level-up-your-solidity-llm-tooling-with-slither-mcp/</loc><lastmod>2025-11-15T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/mcp/</loc><lastmod>2025-11-15T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/slither/</loc><lastmod>2025-11-15T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/</loc><lastmod>2025-11-14T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/post-quantum/</loc><lastmod>2025-11-14T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/scott-arciszewski/</loc><lastmod>2025-11-14T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/binary-analysis/</loc><lastmod>2025-11-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/11/13/building-checksec-without-boundaries-with-checksec-anywhere/</loc><lastmod>2025-11-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/capture-the-flag/</loc><lastmod>2025-11-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/gabe-sherman/</loc><lastmod>2025-11-13T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/anish-naik/</loc><lastmod>2025-11-07T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/11/07/balancer-hack-analysis-and-guidance-for-the-defi-ecosystem/</loc><lastmod>2025-11-07T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/jim-miller/</loc><lastmod>2025-11-07T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/joop-van-de-pol/</loc><lastmod>2025-10-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/10/31/the-cryptography-behind-electronic-passports/</loc><lastmod>2025-10-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/zero-knowledge/</loc><lastmod>2025-10-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/confidential-computing/</loc><lastmod>2025-10-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/tjaden-hess/</loc><lastmod>2025-10-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/trusted-execution-environment/</loc><lastmod>2025-10-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/10/30/vulnerabilities-in-luks2-disk-encryption-for-confidential-vms/</loc><lastmod>2025-10-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/10/22/prompt-injection-to-rce-in-ai-agents/</loc><lastmod>2025-10-22T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/remote-code-execution/</loc><lastmod>2025-10-22T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/will-vandevanter/</loc><lastmod>2025-10-22T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/jay-little/</loc><lastmod>2025-09-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/pawe%C5%82-p%C5%82atek/</loc><lastmod>2025-09-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/25/taming-2500-compiler-warnings-with-codeql-an-openvpn2-case-study/</loc><lastmod>2025-09-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/brad-swain/</loc><lastmod>2025-09-24T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/24/supply-chain-attacks-are-exploiting-our-assumptions/</loc><lastmod>2025-09-24T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/guillermo-larregay/</loc><lastmod>2025-09-18T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/18/use-mutation-testing-to-find-the-bugs-your-tests-dont-catch/</loc><lastmod>2025-09-18T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/boyan-milanov/</loc><lastmod>2025-09-16T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/16/ficklings-new-ai/ml-pickle-file-scanner/</loc><lastmod>2025-09-16T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/10/how-sui-move-rethinks-flash-loan-security/</loc><lastmod>2025-09-10T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/nicolas-donboly/</loc><lastmod>2025-09-10T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/cold-storage/</loc><lastmod>2025-09-05T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/05/safer-cold-storage-on-ethereum/</loc><lastmod>2025-09-05T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/application-security/</loc><lastmod>2025-09-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/darius-houle/</loc><lastmod>2025-09-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/09/03/subverting-code-integrity-checks-to-locally-backdoor-signal-1password-slack-and-more/</loc><lastmod>2025-09-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/aidan-kwok/</loc><lastmod>2025-08-28T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/28/intern-projects-that-outlived-the-internship/</loc><lastmod>2025-08-28T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/working-at-trail-of-bits/</loc><lastmod>2025-08-28T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/27/implement-eip-7730-today/</loc><lastmod>2025-08-27T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/empire-hacking/</loc><lastmod>2025-08-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/25/speedrunning-the-new-york-subway/</loc><lastmod>2025-08-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/kikimora-morozova/</loc><lastmod>2025-08-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/suha-sabi-hussain/</loc><lastmod>2025-08-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/</loc><lastmod>2025-08-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/20/marshal-madness-a-brief-history-of-ruby-deserialization-exploits/</loc><lastmod>2025-08-20T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/ruby/</loc><lastmod>2025-08-20T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/aixcc/</loc><lastmod>2025-08-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/darpa/</loc><lastmod>2025-08-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/09/trail-of-bits-buttercup-wins-2nd-place-in-aixcc-challenge/</loc><lastmod>2025-08-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/08/buttercup-is-now-open-source/</loc><lastmod>2025-08-08T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/michael-brown/</loc><lastmod>2025-08-08T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/07/aixcc-finals-tale-of-the-tape/</loc><lastmod>2025-08-07T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/trent-brunson/</loc><lastmod>2025-08-07T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/kevin-higgs/</loc><lastmod>2025-08-06T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/06/prompt-injection-engineering-for-attackers-exploiting-github-copilot/</loc><lastmod>2025-08-06T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/people/</loc><lastmod>2025-08-04T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/04/uncovering-memory-corruption-in-nvidia-triton-as-a-new-hire/</loc><lastmod>2025-08-04T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/education/</loc><lastmod>2025-08-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/sponsorships/</loc><lastmod>2025-08-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/08/01/the-unconventional-innovator-scholarship/</loc><lastmod>2025-08-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/31/hijacking-multi-agent-systems-in-your-pajamas/</loc><lastmod>2025-07-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/multi-agent-systems/</loc><lastmod>2025-07-31T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/cliff-smith/</loc><lastmod>2025-07-28T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/28/we-built-the-security-layer-mcp-always-needed/</loc><lastmod>2025-07-28T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alan-cao/</loc><lastmod>2025-07-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/conferences/</loc><lastmod>2025-07-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/25/exploiting-zero-days-in-abandoned-hardware/</loc><lastmod>2025-07-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/will-tan/</loc><lastmod>2025-07-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/23/inside-ethcc8-becoming-a-smart-contract-auditor/</loc><lastmod>2025-07-23T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/21/detecting-code-copying-at-scale-with-vendetect/</loc><lastmod>2025-07-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/18/building-secure-messaging-is-hard-a-nuanced-take-on-the-bitchat-security-debate/</loc><lastmod>2025-07-18T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/andrew-pan/</loc><lastmod>2025-07-08T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/08/investigate-your-dependencies-with-deptective/</loc><lastmod>2025-07-08T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/07/02/buckle-up-buttercup-aixccs-scored-round-is-underway/</loc><lastmod>2025-07-02T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/06/25/maturing-your-smart-contracts-beyond-private-key-risk/</loc><lastmod>2025-06-25T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/06/17/unexpected-security-footguns-in-gos-parsers/</loc><lastmod>2025-06-17T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/vasco-franco/</loc><lastmod>2025-06-17T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/joe-doyle/</loc><lastmod>2025-06-10T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/06/10/what-we-learned-reviewing-one-of-the-first-dkls23-libraries-from-silence-laboratories/</loc><lastmod>2025-06-10T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/05/30/a-deep-dive-into-axioms-halo2-circuits/</loc><lastmod>2025-05-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/filipe-casal/</loc><lastmod>2025-05-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/fredrik-dahlgren/</loc><lastmod>2025-05-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/marc-ilunga/</loc><lastmod>2025-05-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/policy/</loc><lastmod>2025-05-29T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/stablecoins/</loc><lastmod>2025-05-29T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/05/29/the-custodial-stablecoin-rekt-test/</loc><lastmod>2025-05-29T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/05/14/the-cryptography-behind-passkeys/</loc><lastmod>2025-05-14T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/05/02/datasig-fingerprinting-ai/ml-datasets-to-stop-data-borne-attacks/</loc><lastmod>2025-05-02T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alexis-challande/</loc><lastmod>2025-05-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/05/01/making-pypis-test-suite-81-faster/</loc><lastmod>2025-05-01T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/30/insecure-credential-storage-plagues-mcp/</loc><lastmod>2025-04-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/keith-hoodlet/</loc><lastmod>2025-04-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp/</loc><lastmod>2025-04-29T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/23/how-mcp-servers-can-steal-your-conversation-history/</loc><lastmod>2025-04-23T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/21/jumping-the-line-how-mcp-servers-can-attack-you-before-you-ever-use-them/</loc><lastmod>2025-04-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/21/kicking-off-aixccs-finals-with-buttercup/</loc><lastmod>2025-04-21T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/18/sneak-peek-a-new-asn.1-api-for-python/</loc><lastmod>2025-04-18T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/william-woodruff/</loc><lastmod>2025-04-18T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/17/mitigating-elusive-comet-zoom-remote-control-attacks/</loc><lastmod>2025-04-17T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/operational-security/</loc><lastmod>2025-04-17T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/fuzzing/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/04/09/introducing-a-new-section-on-snapshot-fuzzing-for-kernel-level-testing-in-the-testing-handbook/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/kernel/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/maciej-doma%C5%84ski/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/snapshot-fuzzing/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/testing-handbook/</loc><lastmod>2025-04-09T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/benchmarking/</loc><lastmod>2025-03-06T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/03/06/benchmarking-opensearch-and-elasticsearch/</loc><lastmod>2025-03-06T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/evan-downing/</loc><lastmod>2025-03-06T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/03/03/continuous-trail/</loc><lastmod>2025-03-03T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/kelly-kaoudis/</loc><lastmod>2025-03-03T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/spencer-michaels/</loc><lastmod>2025-03-03T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way/</loc><lastmod>2025-02-28T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/25/how-threat-modeling-could-have-prevented-the-1.5b-bybit-hack/</loc><lastmod>2025-02-25T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/21/dont-recurse-on-untrusted-input/</loc><lastmod>2025-02-21T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/java/</loc><lastmod>2025-02-21T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/recursion/</loc><lastmod>2025-02-21T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/21/the-1.5b-bybit-hack-the-era-of-operational-security-failures-has-arrived/</loc><lastmod>2025-02-21T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/josselin-feist/</loc><lastmod>2025-02-14T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/14/unleashing-medusa-fast-and-scalable-smart-contract-fuzzing/</loc><lastmod>2025-02-14T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/13/were-partnering-to-strengthen-tons-defi-ecosystem/</loc><lastmod>2025-02-13T09:00:03-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/invariant-development/</loc><lastmod>2025-02-12T09:30:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/12/the-call-for-invariant-driven-development/</loc><lastmod>2025-02-12T09:30:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/02/05/preventing-account-takeover-on-centralized-cryptocurrency-exchanges-in-2025/</loc><lastmod>2025-02-05T09:00:37-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/01/30/pypi-now-supports-archiving-projects/</loc><lastmod>2025-01-30T09:00:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/</loc><lastmod>2025-01-28T09:00:18-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2025/01/23/celebrating-our-2024-open-source-contributions/</loc><lastmod>2025-01-23T09:00:30-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/</loc><lastmod>2024-12-11T09:00:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/12/11/auditing-the-ruby-ecosystems-central-package-repository/</loc><lastmod>2024-12-11T09:00:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/holly-womack/</loc><lastmod>2024-12-11T09:00:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/12/09/35-more-semgrep-rules-infrastructure-supply-chain-and-ruby/</loc><lastmod>2024-12-09T09:00:43-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/semgrep/</loc><lastmod>2024-12-09T09:00:43-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/travis-peters/</loc><lastmod>2024-12-09T09:00:43-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/artem-dinaburg/</loc><lastmod>2024-11-19T09:00:37-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/11/19/evaluating-solidity-support-in-ai-coding-assistants/</loc><lastmod>2024-11-19T09:00:37-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/11/14/attestations-a-new-generation-of-signatures-on-pypi/</loc><lastmod>2024-11-14T09:00:15-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/11/13/killing-filecoin-nodes/</loc><lastmod>2024-11-13T06:00:12-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/simone-monica/</loc><lastmod>2024-11-13T06:00:12-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/artur-cygan/</loc><lastmod>2024-10-31T09:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/10/31/fuzzing-between-the-lines-in-popular-barcode-software/</loc><lastmod>2024-10-31T09:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/</loc><lastmod>2024-10-25T09:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/10/10/auditing-gradio-5-hugging-faces-ml-gui-framework/</loc><lastmod>2024-10-10T12:00:29-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/10/01/securing-the-software-supply-chain-with-the-slsa-framework/</loc><lastmod>2024-10-01T09:00:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/</loc><lastmod>2024-09-24T09:00:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/19/announcing-the-trail-of-bits-and-semgrep-partnership/</loc><lastmod>2024-09-19T09:00:30-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/17/inside-def-con-michael-brown-on-how-ai-ml-is-revolutionizing-cybersecurity/</loc><lastmod>2024-09-17T09:00:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/</loc><lastmod>2024-09-13T09:00:54-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/10/sanitize-your-c-containers-asan-annotations-step-by-step/</loc><lastmod>2024-09-10T09:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/06/unstripping-binaries-restoring-debugging-information-in-gdb-with-pwndbg/</loc><lastmod>2024-09-06T09:00:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/binary-ninja/</loc><lastmod>2024-09-06T09:00:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/jason-an/</loc><lastmod>2024-09-06T09:00:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/peter-goodman/</loc><lastmod>2024-09-05T09:00:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/09/05/what-would-you-do-with-that-old-gpu/</loc><lastmod>2024-09-05T09:00:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/27/provisioning-cloud-infrastructure-the-wrong-way-but-faster/</loc><lastmod>2024-08-27T09:00:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/</loc><lastmod>2024-08-21T09:00:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/</loc><lastmod>2024-08-15T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/12/trail-of-bits-advances-to-aixcc-finals/</loc><lastmod>2024-08-12T19:23:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/09/trail-of-bits-buttercup-heads-to-darpas-aixcc/</loc><lastmod>2024-08-09T09:10:29-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/08/05/cloud-cryptography-demystified-google-cloud-platform/</loc><lastmod>2024-08-05T09:00:03-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/</loc><lastmod>2024-07-30T09:00:34-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/justin-jacob/</loc><lastmod>2024-07-25T09:00:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/25/our-crypto-experts-answer-10-key-questions/</loc><lastmod>2024-07-25T09:00:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/12/announcing-aes-gem-aes-with-galois-extended-mode/</loc><lastmod>2024-07-12T09:00:35-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/press-release/</loc><lastmod>2024-07-09T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/09/trail-of-bits-named-a-leader-in-cybersecurity-consulting-services/</loc><lastmod>2024-07-09T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/05/auditing-the-ask-astro-llm-qa-app/</loc><lastmod>2024-07-05T09:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/07/01/quantum-is-unimportant-to-post-quantum/</loc><lastmod>2024-07-01T09:00:01-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/24/disarming-fiat-shamir-footguns/</loc><lastmod>2024-06-24T09:00:38-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/21/eurollvm-2024-trip-report/</loc><lastmod>2024-06-21T09:00:22-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/henrich-lauko/</loc><lastmod>2024-06-21T09:00:22-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/marek-surovi%C4%8D/</loc><lastmod>2024-06-21T09:00:22-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/18/themes-from-real-world-crypto-2024/</loc><lastmod>2024-06-18T09:00:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/17/finding-mispriced-opcodes-with-fuzzing/</loc><lastmod>2024-06-17T09:00:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/max-ammann/</loc><lastmod>2024-06-17T09:00:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/14/understanding-apples-on-device-and-server-foundations-model-release/</loc><lastmod>2024-06-14T16:49:37-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/adelin-travers/</loc><lastmod>2024-06-14T15:46:48-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/14/pcc-bold-step-forward-not-without-flaws/</loc><lastmod>2024-06-14T15:46:48-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/14/announcing-the-burp-suite-professional-chapter-in-the-testing-handbook/</loc><lastmod>2024-06-14T09:00:23-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2/</loc><lastmod>2024-06-11T11:00:17-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/</loc><lastmod>2024-06-11T09:00:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/06/07/announcing-ai-ml-safety-and-security-trainings/</loc><lastmod>2024-06-07T09:00:41-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/training/</loc><lastmod>2024-06-07T09:00:41-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/05/16/understanding-addresssanitizer-better-memory-safety-for-your-code/</loc><lastmod>2024-05-16T09:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/05/14/a-peek-into-build-provenance-for-homebrew/</loc><lastmod>2024-05-14T09:00:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/joe-sweeney/</loc><lastmod>2024-05-14T09:00:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/ben-siraphob/</loc><lastmod>2024-05-08T09:30:07-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/echidna/</loc><lastmod>2024-05-08T09:30:07-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/05/08/using-benchmarks-to-speed-up-echidna/</loc><lastmod>2024-05-08T09:30:07-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/francesco-bertolaccini/</loc><lastmod>2024-05-02T09:00:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/05/02/the-life-and-times-of-an-abstract-syntax-tree/</loc><lastmod>2024-05-02T09:00:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/04/30/curvance-invariants-unleashed/</loc><lastmod>2024-04-30T09:30:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/nat-chin/</loc><lastmod>2024-04-30T09:30:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/04/26/announcing-two-new-lms-libraries/</loc><lastmod>2024-04-26T09:00:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/will-song/</loc><lastmod>2024-04-26T09:00:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/04/15/5-reasons-to-strive-for-better-disclosure-processes/</loc><lastmod>2024-04-15T09:00:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/29/introducing-ruzzy-a-coverage-guided-ruby-fuzzer/</loc><lastmod>2024-03-29T09:30:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/gustavo-grieco/</loc><lastmod>2024-03-22T09:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/tarun-bansal/</loc><lastmod>2024-03-22T09:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/22/why-fuzzing-over-formal-verification/</loc><lastmod>2024-03-22T09:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/20/streamline-the-static-analysis-triage-process-with-sarif-explorer/</loc><lastmod>2024-03-20T09:30:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/19/read-code-like-a-pro-with-our-weaudit-vscode-extension/</loc><lastmod>2024-03-19T09:30:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/18/releasing-the-attacknet-a-new-tool-for-finding-bugs-in-blockchain-nodes-using-chaos-testing/</loc><lastmod>2024-03-18T09:00:59-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/13/secure-your-blockchain-project-from-the-start/</loc><lastmod>2024-03-13T09:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/11/darpa-awards-1-million-to-trail-of-bits-for-ai-cyber-challenge/</loc><lastmod>2024-03-11T13:46:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/08/out-of-the-kernel-into-the-tokens/</loc><lastmod>2024-03-08T09:00:48-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/05/cryptographic-design-review-of-ockam/</loc><lastmod>2024-03-05T09:00:38-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/design-review/</loc><lastmod>2024-03-05T09:00:38-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/04/relishing-new-fickling-features-for-securing-ml-systems/</loc><lastmod>2024-03-04T09:00:44-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/01/toward-more-effective-curl-fuzzing/</loc><lastmod>2024-03-01T09:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/shaun-mirani/</loc><lastmod>2024-03-01T09:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/troy-sargent/</loc><lastmod>2024-03-01T07:00:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/03/01/when-try-try-try-again-leads-to-out-of-order-execution-bugs/</loc><lastmod>2024-03-01T07:00:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/28/our-response-to-the-us-armys-rfi-on-developing-aibom-tools-2/</loc><lastmod>2024-02-28T11:30:05-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/26/circomspect-has-been-integrated-into-the-sindri-cli/</loc><lastmod>2024-02-26T09:00:02-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/23/continuously-fuzzing-python-c-extensions/</loc><lastmod>2024-02-23T09:30:03-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/20/breaking-the-shared-key-in-threshold-signature-schemes/</loc><lastmod>2024-02-20T09:30:37-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/16/a-few-notes-on-aws-nitro-enclaves-images-and-attestation/</loc><lastmod>2024-02-16T09:30:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/14/cloud-cryptography-demystified-amazon-web-services/</loc><lastmod>2024-02-14T09:00:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/12/why-windows-cant-follow-wsl-symlinks/</loc><lastmod>2024-02-12T09:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/windows/</loc><lastmod>2024-02-12T09:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/yarden-shafir/</loc><lastmod>2024-02-12T09:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/09/master-fuzzing-with-our-new-testing-handbook-chapter/</loc><lastmod>2024-02-09T09:00:13-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/rust/</loc><lastmod>2024-02-09T09:00:13-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/07/binary-type-inference-in-ghidra/</loc><lastmod>2024-02-07T09:00:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/ian-smith/</loc><lastmod>2024-02-07T09:00:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/05/improving-the-state-of-cosmos-fuzzing/</loc><lastmod>2024-02-05T09:00:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/02/02/chaos-communication-congress-37c3-recap/</loc><lastmod>2024-02-02T09:00:01-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/dynamic-analysis/</loc><lastmod>2024-01-31T09:30:48-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/31/introducing-differ-a-new-tool-for-testing-and-validating-transformed-programs/</loc><lastmod>2024-01-31T09:30:48-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/26/enhancing-trust-for-sgx-enclaves/</loc><lastmod>2024-01-26T09:00:31-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/authentication/</loc><lastmod>2024-01-25T09:00:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/25/we-build-x-509-chains-so-you-dont-have-to/</loc><lastmod>2024-01-25T09:00:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/24/celebrating-our-2023-open-source-contributions/</loc><lastmod>2024-01-24T09:00:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/osquery/</loc><lastmod>2024-01-24T09:00:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/events/</loc><lastmod>2024-01-18T09:00:38-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/18/our-thoughts-on-aixccs-competition-format/</loc><lastmod>2024-01-18T09:00:38-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/17/30-new-semgrep-rules-ansible-java-kotlin-shell-scripts-and-more/</loc><lastmod>2024-01-17T08:30:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/containers/</loc><lastmod>2024-01-17T08:30:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sam-alws/</loc><lastmod>2024-01-17T08:30:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/heidy-khlaaf/</loc><lastmod>2024-01-16T12:00:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/</loc><lastmod>2024-01-16T12:00:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/tyler-sorensen/</loc><lastmod>2024-01-16T12:00:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/15/internet-freedom-with-the-open-technology-fund/</loc><lastmod>2024-01-15T08:30:54-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/jeff-braswell/</loc><lastmod>2024-01-15T08:30:54-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/12/how-to-introduce-semgrep-to-your-organization/</loc><lastmod>2024-01-12T09:00:26-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/kubernetes/</loc><lastmod>2024-01-09T09:00:08-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/09/securing-open-source-infrastructure-with-ostif/</loc><lastmod>2024-01-09T09:00:08-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2024/01/02/tag-youre-it-signal-tagging-in-circom/</loc><lastmod>2024-01-02T09:00:01-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/</loc><lastmod>2023-12-29T09:00:51-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/29/billion-times-emptiness/</loc><lastmod>2023-12-29T09:00:51-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/27/ai-in-windows-investigating-windows-copilot/</loc><lastmod>2023-12-27T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/26/weve-added-more-content-to-zkdocs/</loc><lastmod>2023-12-26T09:00:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/22/catching-openssl-misuse-using-codeql/</loc><lastmod>2023-12-22T09:00:35-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/damien-santiago/</loc><lastmod>2023-12-22T09:00:35-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/20/summer-associates-2023-recap/</loc><lastmod>2023-12-20T09:00:13-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/18/a-trail-of-flipping-bits/</loc><lastmod>2023-12-18T08:30:16-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/cyber-grand-challenge/</loc><lastmod>2023-12-14T09:00:45-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/14/darpas-ai-cyber-challenge-were-in/</loc><lastmod>2023-12-14T09:00:45-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/11/say-hello-to-the-next-chapter-of-the-testing-handbook/</loc><lastmod>2023-12-11T08:30:16-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/12/06/publishing-trail-of-bits-codeql-queries/</loc><lastmod>2023-12-06T08:30:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/</loc><lastmod>2023-11-22T07:00:12-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/11/20/how-cisa-can-improve-oss-security/</loc><lastmod>2023-11-20T09:35:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alvin-crighton/</loc><lastmod>2023-11-15T10:15:05-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/anusha-ghosh/</loc><lastmod>2023-11-15T10:15:05-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/11/15/assessing-the-security-posture-of-a-widely-used-vision-model-yolov7/</loc><lastmod>2023-11-15T10:15:05-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/11/14/our-audit-of-pypi/</loc><lastmod>2023-11-14T08:00:37-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/11/06/adding-build-provenance-to-homebrew/</loc><lastmod>2023-11-06T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/10/30/the-issue-with-ats-in-apples-macos-and-ios/</loc><lastmod>2023-10-30T08:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/will-brattain/</loc><lastmod>2023-10-30T08:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/10/23/numbers-turned-weapons-dos-in-osmosis-math-library/</loc><lastmod>2023-10-23T14:27:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/10/05/introducing-invariant-development-as-a-service/</loc><lastmod>2023-10-05T08:00:52-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/ebpf/</loc><lastmod>2023-09-25T07:00:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/09/25/pitfalls-of-relying-on-ebpf-for-security-monitoring-and-some-solutions/</loc><lastmod>2023-09-25T07:00:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/09/20/dont-overextend-your-oblivious-transfer/</loc><lastmod>2023-09-20T08:00:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/threshold-signatures/</loc><lastmod>2023-09-20T08:00:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/david-pokora/</loc><lastmod>2023-09-18T08:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/</loc><lastmod>2023-09-18T08:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/brent-pappas/</loc><lastmod>2023-09-11T08:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/09/11/holy-macroni-a-recipe-for-progressive-language-enhancement/</loc><lastmod>2023-09-11T08:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/mlir/</loc><lastmod>2023-09-11T08:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/vast/</loc><lastmod>2023-09-11T08:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/29/secure-your-apollo-graphql-server-with-semgrep/</loc><lastmod>2023-08-29T08:00:14-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/iverify/</loc><lastmod>2023-08-28T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/28/iverify-is-now-an-independent-company/</loc><lastmod>2023-08-28T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/products/</loc><lastmod>2023-08-28T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/23/the-engineers-guide-to-blockchain-finality/</loc><lastmod>2023-08-23T07:00:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/14/can-you-pass-the-rekt-test/</loc><lastmod>2023-08-14T04:00:50-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/09/use-our-suite-of-ebpf-libraries/</loc><lastmod>2023-08-09T06:45:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/08/02/a-mistake-in-the-bulletproofs-paper-could-have-led-to-the-theft-of-millions-of-dollars/</loc><lastmod>2023-08-02T07:00:30-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/31/how-ai-will-affect-cybersecurity-what-we-told-the-cftc/</loc><lastmod>2023-07-31T07:00:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/28/the-future-of-clang-based-tooling/</loc><lastmod>2023-07-28T07:00:19-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/26/announcing-the-trail-of-bits-testing-handbook/</loc><lastmod>2023-07-26T07:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/elvis-skozdopolj/</loc><lastmod>2023-07-21T07:00:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/21/fuzzing-on-chain-contracts-with-echidna/</loc><lastmod>2023-07-21T07:00:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/18/trail-of-bitss-response-to-ostp-national-priorities-for-ai-rfi/</loc><lastmod>2023-07-18T13:46:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/14/evaluating-blockchain-security-maturity/</loc><lastmod>2023-07-14T03:00:03-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/12/what-we-told-the-cftc-about-crypto-threats/</loc><lastmod>2023-07-12T07:00:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/07/07/differential-fuzz-testing-upgradeable-smart-contracts-with-diffusc/</loc><lastmod>2023-07-07T07:00:33-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/william-bodell/</loc><lastmod>2023-07-07T07:00:33-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/06/16/trail-of-bitss-response-to-ntia-ai-accountability-rfc/</loc><lastmod>2023-06-16T08:00:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/06/15/finding-bugs-with-mlir-and-vast/</loc><lastmod>2023-06-15T07:00:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/05/23/trusted-publishing-a-new-benchmark-for-packaging-security/</loc><lastmod>2023-05-23T07:00:20-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/05/16/real-world-crypto-2023-recap/</loc><lastmod>2023-05-16T09:54:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/05/15/introducing-windows-notification-facilitys-wnf-code-integrity/</loc><lastmod>2023-05-15T07:00:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/04/25/loose-code-sinks-nodes/</loc><lastmod>2023-04-25T07:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/04/20/typos-that-omit-security-features-and-how-to-test-for-them/</loc><lastmod>2023-04-20T07:00:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/04/18/a-winters-tale-improving-types-and-messages-in-gdbs-python-api/</loc><lastmod>2023-04-18T07:00:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/matheus-branco-borella/</loc><lastmod>2023-04-18T07:00:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/henrik-brodin/</loc><lastmod>2023-03-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/03/30/acropalypse-polytracker-blind-spots/</loc><lastmod>2023-03-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/03/22/codex-and-gpt4-cant-beat-humans-on-smart-contract-audits/</loc><lastmod>2023-03-22T07:00:49-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/03/21/circomspect-static-analyzer-circom-more-passes/</loc><lastmod>2023-03-21T08:00:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/crytic/</loc><lastmod>2023-03-21T08:00:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/03/14/ai-security-safety-audit-assurance-heidy-khlaaf-odd/</loc><lastmod>2023-03-14T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/02/27/reusable-properties-ethereum-contracts-echidna/</loc><lastmod>2023-02-27T08:00:54-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/02/23/escaping-well-configured-vscode-extensions-for-profit/</loc><lastmod>2023-02-23T08:00:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/02/21/vscode-extension-escape-vulnerability/</loc><lastmod>2023-02-21T08:00:50-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</loc><lastmod>2023-02-16T08:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/rory-m/</loc><lastmod>2023-02-16T08:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/02/14/curl-audit-fuzzing-libcurl-command-line-interface/</loc><lastmod>2023-02-14T08:00:14-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/01/19/ebpf-verifier-harness/</loc><lastmod>2023-01-19T08:00:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/laura-bauman/</loc><lastmod>2023-01-19T08:00:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/aaron-lemasters/</loc><lastmod>2023-01-17T08:00:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/01/17/rpc-investigator-microsoft-windows-remote-procedure-call/</loc><lastmod>2023-01-17T08:00:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/01/13/sigstore-python/</loc><lastmod>2023-01-13T10:00:58-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/</loc><lastmod>2023-01-12T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2023/01/10/open-source-contributions-2022/</loc><lastmod>2023-01-10T08:00:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/samuel-moelius/</loc><lastmod>2023-01-10T08:00:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/year-in-review/</loc><lastmod>2023-01-10T08:00:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/</loc><lastmod>2022-12-22T15:10:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/22/curl-security-audit-threat-model/</loc><lastmod>2022-12-22T15:10:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/nick-selby/</loc><lastmod>2022-12-22T15:10:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/22/syntax-searching-c-c-clang-ast/</loc><lastmod>2022-12-22T08:00:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/mate-kukri/</loc><lastmod>2022-12-22T08:00:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/20/process-reparenting-microsoft-windows/</loc><lastmod>2022-12-20T08:00:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/calvin-fong/</loc><lastmod>2022-12-15T08:00:23-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/15/manitcoreui-symbolic-execution-gui/</loc><lastmod>2022-12-15T08:00:23-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/manticore/</loc><lastmod>2022-12-15T08:00:23-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/symbolic-execution/</loc><lastmod>2022-12-15T08:00:23-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/13/manticore-gui-plugin-binary-ninja-ghidra/</loc><lastmod>2022-12-13T08:00:04-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/wong-kok-rui/</loc><lastmod>2022-12-13T08:00:04-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/12/08/hybrid-echidna-fuzzing-optik-maat/</loc><lastmod>2022-12-08T08:00:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/tom-malcolm/</loc><lastmod>2022-12-08T08:00:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/11/29/specialized-zero-knowledge-proof-failures/</loc><lastmod>2022-11-29T07:30:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/11/15/python-wheels-abi-abi3audit/</loc><lastmod>2022-11-15T07:30:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/11/14/livestream-workshop-fuzzing-echidna-slither/</loc><lastmod>2022-11-14T08:30:23-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/andreas-kellas/</loc><lastmod>2022-11-10T07:30:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/11/10/divergent-representations-variable-overflows-c-compiler/</loc><lastmod>2022-11-10T07:30:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/11/08/sigstore-code-signing-verification-software-supply-chain/</loc><lastmod>2022-11-08T07:30:15-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/</loc><lastmod>2022-10-25T07:30:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/andrew-haberlandt/</loc><lastmod>2022-10-12T08:00:55-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/10/12/solana-jit-compiler-ebpf-arm64/</loc><lastmod>2022-10-12T08:00:55-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/vara-prasad-bandaru/</loc><lastmod>2022-10-05T09:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/10/05/trail-of-bits-internship-blockchain-tealer/</loc><lastmod>2022-10-05T09:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/10/03/semgrep-maching-learning-static-analysis/</loc><lastmod>2022-10-03T09:00:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/09/15/it-pays-to-be-circomspect/</loc><lastmod>2022-09-15T00:00:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alan-chang/</loc><lastmod>2022-08-25T09:00:30-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/08/25/magnifier-an-experiment-with-interactive-decompilation/</loc><lastmod>2022-08-25T09:00:30-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alex-groce/</loc><lastmod>2022-08-17T09:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/08/17/using-mutants-to-improve-slither/</loc><lastmod>2022-08-17T09:00:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/careers/</loc><lastmod>2022-08-12T09:00:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/08/12/the-road-to-the-apprenticeship/</loc><lastmod>2022-08-12T09:00:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/07/28/shedding-smart-contract-storage-with-slither/</loc><lastmod>2022-07-28T09:00:07-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/07/01/libmagic-the-blathering/</loc><lastmod>2022-07-01T07:00:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/30/a-typical-day-as-a-trail-of-bits-engineer-consultant/</loc><lastmod>2022-06-30T09:00:29-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/meta/</loc><lastmod>2022-06-28T09:00:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/28/the-trail-of-bits-hiring-process/</loc><lastmod>2022-06-28T09:00:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/24/managing-risk-in-blockchain-deployments/</loc><lastmod>2022-06-24T09:00:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/21/are-blockchains-decentralized/</loc><lastmod>2022-06-21T05:00:39-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/20/announcing-the-new-trail-of-bits-podcast/</loc><lastmod>2022-06-20T22:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/podcast/</loc><lastmod>2022-06-20T22:00:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/adam-meily/</loc><lastmod>2022-06-09T07:00:19-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/06/09/themes-from-pycon-us-2022/</loc><lastmod>2022-06-09T07:00:19-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/05/17/interactive-decompilation-with-rellic-xref/</loc><lastmod>2022-05-17T07:00:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/05/03/themes-from-real-world-crypto-2022/</loc><lastmod>2022-05-03T07:00:04-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/christian-presa-schnell/</loc><lastmod>2022-04-26T07:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/26/improving-the-state-of-go-fuzz/</loc><lastmod>2022-04-26T07:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/20/amarna-static-analysis-for-cairo-programs/</loc><lastmod>2022-04-20T07:00:04-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/18/the-frozen-heart-vulnerability-in-plonk/</loc><lastmod>2022-04-18T07:00:01-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/15/the-frozen-heart-vulnerability-in-bulletproofs/</loc><lastmod>2022-04-15T07:00:52-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/14/the-frozen-heart-vulnerability-in-giraults-proof-of-knowledge/</loc><lastmod>2022-04-14T07:00:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/</loc><lastmod>2022-04-13T07:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/03/25/towards-practical-security-optimizations-for-binaries/</loc><lastmod>2022-03-25T08:58:54-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/03/02/optimizing-a-smart-contract-fuzzer/</loc><lastmod>2022-03-02T07:00:33-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/02/23/maat-symbolic-execution-made-easy/</loc><lastmod>2022-02-23T07:00:08-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/02/01/part-2-rusty-crypto/</loc><lastmod>2022-02-01T07:00:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/01/26/part-1-the-life-of-an-optimization-barrier/</loc><lastmod>2022-01-26T07:00:35-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/01/19/c-your-data-structures-with-rellic-headergen/</loc><lastmod>2022-01-19T07:00:12-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/01/11/finding-unhandled-errors-using-codeql/</loc><lastmod>2022-01-11T07:00:58-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/stefan-nagy/</loc><lastmod>2022-01-05T07:00:51-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2022/01/05/toward-a-best-of-both-worlds-binary-disassembler/</loc><lastmod>2022-01-05T07:00:51-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/</loc><lastmod>2021-12-31T07:00:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/12/31/celebrating-our-2021-open-source-contributions/</loc><lastmod>2021-12-31T07:00:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sam-moelius/</loc><lastmod>2021-12-31T07:00:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/12/21/disclosing-shamirs-secret-sharing-vulnerabilities-and-announcing-zkdocs/</loc><lastmod>2021-12-21T07:00:04-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/12/16/detecting-miso-and-opyns-msg-value-reuse-vulnerability-with-slither/</loc><lastmod>2021-12-16T13:00:49-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/12/16/it-depends/</loc><lastmod>2021-12-16T08:00:14-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/17/mui-visualizing-symbolic-execution-with-manticore-and-binary-ninja/</loc><lastmod>2021-11-17T07:00:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/12/how-to-choose-an-interesting-project/</loc><lastmod>2021-11-12T00:09:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/11/motivating-global-stabilization/</loc><lastmod>2021-11-11T10:39:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/10/announcing-osquery-5-now-with-endpointsecurity-on-macos/</loc><lastmod>2021-11-10T01:05:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sharvil-shah/</loc><lastmod>2021-11-10T01:05:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/philip-wang/</loc><lastmod>2021-11-09T00:45:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/privacy/</loc><lastmod>2021-11-09T00:45:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/09/privacyraven-implementing-a-proof-of-concept-for-model-inversion/</loc><lastmod>2021-11-09T00:45:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/09/write-rust-lints-without-forking-clippy/</loc><lastmod>2021-11-09T00:30:40-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/09/all-your-tracing-are-belong-to-bpf/</loc><lastmod>2021-11-09T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alex-useche/</loc><lastmod>2021-11-08T23:28:45-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/11/08/discovering-goroutine-leaks-with-semgrep/</loc><lastmod>2021-11-08T23:28:45-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/aaron-yoo/</loc><lastmod>2021-04-02T00:52:39-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/04/02/solar-context-free-interactive-analysis-for-solidity/</loc><lastmod>2021-04-02T00:52:39-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/03/23/a-year-in-the-life-of-a-compiler-fuzzing-campaign/</loc><lastmod>2021-03-23T11:00:37-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/allison-husain/</loc><lastmod>2021-03-19T10:00:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/03/19/un-bee-lievable-performance-fast-coverage-guided-fuzzing-with-honeybee-and-intel-processor-trace/</loc><lastmod>2021-03-19T10:00:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/03/15/never-a-dill-moment-exploiting-machine-learning-pickle-files/</loc><lastmod>2021-03-15T11:06:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/paul-kehrer/</loc><lastmod>2021-02-26T10:31:47-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/02/26/the-tao-of-continuous-integration/</loc><lastmod>2021-02-26T10:31:47-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/02/19/serving-up-zero-knowledge-proofs/</loc><lastmod>2021-02-19T06:59:31-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/02/05/confessions-of-a-smart-contract-paper-reviewer/</loc><lastmod>2021-02-05T06:59:10-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2021/02/02/pdf-is-broken-a-justctf-challenge/</loc><lastmod>2021-02-02T07:50:28-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/</loc><lastmod>2020-12-16T11:01:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/12/16/breaking-aave-upgradeability/</loc><lastmod>2020-12-16T11:01:55-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/ben-perez/</loc><lastmod>2020-12-14T07:50:27-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/12/14/reverie-an-optimized-zero-knowledge-proof-system/</loc><lastmod>2020-12-14T07:50:27-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/11/25/high-fidelity-build-instrumentation-with-blight/</loc><lastmod>2020-11-25T09:38:10-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/johanna-ratliff/</loc><lastmod>2020-11-24T08:00:04-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/11/24/smart-and-simple-ways-to-prevent-symlink-attacks-in-go/</loc><lastmod>2020-11-24T08:00:04-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/30/good-idea-bad-design-how-the-diamond-standard-falls-short/</loc><lastmod>2020-10-30T13:19:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/23/efficient-audits-with-machine-learning-and-slither-simil/</loc><lastmod>2020-10-23T07:00:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sina-pilehchiha/</loc><lastmod>2020-10-23T07:00:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/22/lets-build-a-high-performance-fuzzer-with-gpus/</loc><lastmod>2020-10-22T06:00:14-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/ryan-eberhardt/</loc><lastmod>2020-10-22T06:00:14-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/14/osquery-using-d-bus-to-query-systemd-data/</loc><lastmod>2020-10-14T08:00:17-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/rachel-cipkins/</loc><lastmod>2020-10-14T08:00:17-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/09/detecting-iterator-invalidation-with-codeql/</loc><lastmod>2020-10-09T08:30:22-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/10/08/privacyraven-has-left-the-nest/</loc><lastmod>2020-10-08T08:00:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/28/graphtage/</loc><lastmod>2020-08-28T07:00:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/safedocs/</loc><lastmod>2020-08-28T07:00:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/17/using-echidna-to-test-a-smart-contract-library/</loc><lastmod>2020-08-17T07:00:17-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/apple/</loc><lastmod>2020-08-12T01:41:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/mike-myers/</loc><lastmod>2020-08-12T01:41:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/sinter/</loc><lastmod>2020-08-12T01:41:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/12/sinter-new-user-mode-security-enforcement-for-macos/</loc><lastmod>2020-08-12T01:41:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/08/05/accidentally-stepping-on-a-defi-lego/</loc><lastmod>2020-08-05T07:00:03-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sam-sun/</loc><lastmod>2020-08-05T07:00:03-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/07/12/new-manticore-verifier-for-smart-contracts/</loc><lastmod>2020-07-12T15:00:46-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/17/advocating-for-change/</loc><lastmod>2020-06-17T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/</loc><lastmod>2020-06-12T07:50:52-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/</loc><lastmod>2020-06-11T07:50:20-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/09/how-to-check-if-a-mutex-is-locked-in-go/</loc><lastmod>2020-06-09T07:50:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/06/05/breaking-the-solidity-compiler-with-a-fuzzer/</loc><lastmod>2020-06-05T07:50:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/29/detecting-bad-openssl-usage/</loc><lastmod>2020-05-29T07:50:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/william-wang/</loc><lastmod>2020-05-29T07:50:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/</loc><lastmod>2020-05-27T07:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/</loc><lastmod>2020-05-22T07:50:14-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/</loc><lastmod>2020-05-21T07:50:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/</loc><lastmod>2020-05-15T07:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/23/announcing-the-1st-international-workshop-on-smart-contract-analysis/</loc><lastmod>2020-04-23T07:50:29-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/</loc><lastmod>2020-04-17T15:53:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/ryan-stortz/</loc><lastmod>2020-04-17T15:53:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/04/07/announcing-our-first-virtual-empire-hacking/</loc><lastmod>2020-04-07T07:00:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/</loc><lastmod>2020-03-30T07:00:46-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/</loc><lastmod>2020-03-23T07:00:25-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/18/financial-cryptography-2020-recap/</loc><lastmod>2020-03-18T07:50:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/paper-review/</loc><lastmod>2020-03-18T07:50:32-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/</loc><lastmod>2020-03-16T07:12:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/13/our-full-report-on-the-voatz-mobile-voting-platform/</loc><lastmod>2020-03-13T07:52:37-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/</loc><lastmod>2020-03-03T14:21:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/eric-hennenfent/</loc><lastmod>2020-01-31T09:00:26-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/</loc><lastmod>2020-01-31T09:00:26-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/23/themes-from-real-world-crypto-2020/</loc><lastmod>2020-01-23T07:00:07-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/</loc><lastmod>2020-01-16T11:28:34-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/</loc><lastmod>2019-12-09T07:00:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/jp-smith/</loc><lastmod>2019-12-09T07:00:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/12/09/introducing-mainnet360-a-joint-economic-and-security-assessment-with-prysm-group/</loc><lastmod>2019-12-09T07:00:52-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/</loc><lastmod>2019-11-27T06:01:30-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/14/introducing-iverify-the-security-toolkit-for-iphone-users/</loc><lastmod>2019-11-14T09:38:48-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/13/announcing-the-crytic-10k-research-prize/</loc><lastmod>2019-11-13T07:00:35-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/11/test-case-reduction/</loc><lastmod>2019-11-11T07:00:11-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/robert-tonic/</loc><lastmod>2019-11-07T07:00:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/07/attacking-go-vr-ttps/</loc><lastmod>2019-11-07T07:00:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/11/01/two-new-tools-that-tame-the-treachery-of-files/</loc><lastmod>2019-11-01T07:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/</loc><lastmod>2019-10-31T07:00:01-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/</loc><lastmod>2019-10-30T07:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/29/grace-hopper-celebration-2019/</loc><lastmod>2019-10-29T11:30:14-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/anne-ouyang/</loc><lastmod>2019-10-25T07:00:56-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/</loc><lastmod>2019-10-25T07:00:56-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/</loc><lastmod>2019-10-24T07:00:04-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/04/multi-party-computation-on-machine-learning/</loc><lastmod>2019-10-04T10:13:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/10/03/tsc-frequency-for-all-better-profiling-and-benchmarking/</loc><lastmod>2019-10-03T06:58:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/</loc><lastmod>2019-09-27T15:09:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/lauren-pearl/</loc><lastmod>2019-09-20T07:00:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/</loc><lastmod>2019-09-20T07:00:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/11/crypto-2019-takeaways/</loc><lastmod>2019-09-11T06:50:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/</loc><lastmod>2019-09-03T06:50:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/aditi-gupta/</loc><lastmod>2019-09-02T06:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/mcsema/</loc><lastmod>2019-09-02T06:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/</loc><lastmod>2019-09-02T06:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/</loc><lastmod>2019-08-30T06:50:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sai-vegasena/</loc><lastmod>2019-08-30T06:50:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/henry-wildermuth/</loc><lastmod>2019-08-29T06:50:20-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/</loc><lastmod>2019-08-29T06:50:20-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/patrick-palka/</loc><lastmod>2019-08-26T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/26/wrappers-delight/</loc><lastmod>2019-08-26T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/09/a-day-in-the-life-of-alessandro-gario-senior-security-engineer/</loc><lastmod>2019-08-09T08:00:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/08/246-findings-from-our-smart-contract-audits-an-executive-summary/</loc><lastmod>2019-08-08T06:50:40-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/chris-evans/</loc><lastmod>2019-08-07T06:50:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/</loc><lastmod>2019-08-07T06:50:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/categories/malware/</loc><lastmod>2019-08-07T06:50:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/</loc><lastmod>2019-08-06T06:50:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/michael-rosenberg/</loc><lastmod>2019-08-06T06:50:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/</loc><lastmod>2019-08-02T06:50:36-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/</loc><lastmod>2019-07-19T21:01:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/16/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/</loc><lastmod>2019-07-16T11:20:19-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/12/librabft/</loc><lastmod>2019-07-12T06:50:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/08/fuck-rsa/</loc><lastmod>2019-07-08T06:50:43-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/03/avoiding-smart-contract-gridlock-with-slither/</loc><lastmod>2019-07-03T14:42:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/rajeev-gopalakrishna/</loc><lastmod>2019-07-03T14:42:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/02/state/</loc><lastmod>2019-07-02T06:50:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/07/01/siderophile-expose-your-crates-unsafety/</loc><lastmod>2019-07-01T11:30:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/27/use-constexpr-for-faster-smaller-and-safer-code/</loc><lastmod>2019-06-27T06:50:06-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/26/panicking-the-right-way-in-go/</loc><lastmod>2019-06-26T06:50:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/carson-harmon/</loc><lastmod>2019-06-25T06:50:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/</loc><lastmod>2019-06-25T06:50:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/20/getting-2fa-right-in-2019/</loc><lastmod>2019-06-20T06:50:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/19/trail-of-bits-icse-2019-recap/</loc><lastmod>2019-06-19T10:35:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/18/why-you-should-go-to-querycon-this-week/</loc><lastmod>2019-06-18T06:50:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/17/leaves-of-hash/</loc><lastmod>2019-06-17T06:50:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/06/07/announcing-manticore-0-3-0/</loc><lastmod>2019-06-07T06:50:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/</loc><lastmod>2019-05-31T11:59:48-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/31/fuzzing-unit-tests-with-deepstate-and-eclipser/</loc><lastmod>2019-05-31T07:00:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/30/announcing-automated-reverse-engineering-trainings/</loc><lastmod>2019-05-30T07:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/josh-watson/</loc><lastmod>2019-05-30T07:00:28-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/</loc><lastmod>2019-05-27T06:30:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/</loc><lastmod>2019-04-18T12:24:51-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/09/announcing-querycon-2019/</loc><lastmod>2019-04-09T07:50:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/</loc><lastmod>2019-04-08T07:50:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/</loc><lastmod>2019-04-01T07:50:55-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/03/28/fuzzing-in-the-year-2000/</loc><lastmod>2019-03-28T07:50:56-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/03/25/what-application-developers-need-to-know-about-tls-early-data-0rtt/</loc><lastmod>2019-03-25T09:00:23-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/</loc><lastmod>2019-01-25T07:50:16-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/vaibhav-sharma/</loc><lastmod>2019-01-25T07:50:16-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/23/fuzzing-an-api-with-deepstate-part-2/</loc><lastmod>2019-01-23T07:50:06-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/</loc><lastmod>2019-01-22T07:50:21-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/akshay-kumar/</loc><lastmod>2019-01-21T07:50:27-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/</loc><lastmod>2019-01-21T07:50:27-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/18/empire-hacking-ethereum-edition-2/</loc><lastmod>2019-01-18T07:50:58-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/</loc><lastmod>2019-01-17T07:50:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/</loc><lastmod>2019-01-14T06:50:53-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/</loc><lastmod>2019-01-02T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/</loc><lastmod>2018-12-31T06:50:18-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/31/fuzzing-like-its-1989/</loc><lastmod>2018-12-31T06:50:18-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/20/10000-research-fellowships-for-underrepresented-talent/</loc><lastmod>2018-12-20T10:00:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/12/17/csaw-ctf-crypto-challenge-breaking-dsa/</loc><lastmod>2018-12-17T06:50:42-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/</loc><lastmod>2018-11-27T06:50:43-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/19/return-of-the-blockchain-security-empire-hacking/</loc><lastmod>2018-11-19T11:20:10-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/16/trail-of-bits-devcon-iv-recap/</loc><lastmod>2018-11-16T06:50:22-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/11/07/we-crypto-now/</loc><lastmod>2018-11-07T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/29/how-contract-migration-works/</loc><lastmod>2018-10-29T06:50:16-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/sophia-dantoine/</loc><lastmod>2018-10-26T06:50:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/</loc><lastmod>2018-10-26T06:50:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/</loc><lastmod>2018-10-22T06:50:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/</loc><lastmod>2018-10-19T06:50:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/12/introduction-to-verifiable-delay-functions-vdfs/</loc><lastmod>2018-10-12T06:50:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/05/how-to-spot-good-fuzzing-research/</loc><lastmod>2018-10-05T06:50:52-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/10/04/ethereum-security-guidance-for-all/</loc><lastmod>2018-10-04T06:50:23-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/26/effortless-security-feature-detection-with-winchecksec/</loc><lastmod>2018-09-26T06:50:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/</loc><lastmod>2018-09-10T09:00:55-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/06/rattle-an-ethereum-evm-binary-analysis-framework/</loc><lastmod>2018-09-06T02:30:38-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/</loc><lastmod>2018-09-05T06:00:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/andy-ying/</loc><lastmod>2018-08-23T07:50:39-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/23/introducing-windows-acl-working-with-acls-in-rust/</loc><lastmod>2018-08-23T07:50:39-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/22/get-an-open-source-security-multiplier/</loc><lastmod>2018-08-22T00:05:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/</loc><lastmod>2018-08-14T12:39:52-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/08/01/bluetooth-invalid-curve-points/</loc><lastmod>2018-08-01T07:05:38-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/</loc><lastmod>2018-07-06T07:50:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/tim-alberdingk/</loc><lastmod>2018-07-06T07:50:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/29/trail-of-bits-donates-100000-to-support-young-researchers-through-summercon/</loc><lastmod>2018-06-29T07:50:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/27/announcing-the-trail-of-bits-osquery-support-group/</loc><lastmod>2018-06-27T07:50:53-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/</loc><lastmod>2018-06-08T07:50:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/garret-reece/</loc><lastmod>2018-05-30T11:06:46-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/</loc><lastmod>2018-05-30T11:06:46-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/29/manage-santa-within-osquery/</loc><lastmod>2018-05-29T07:50:31-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/</loc><lastmod>2018-05-28T12:06:07-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/05/03/state-machine-testing-with-echidna/</loc><lastmod>2018-05-03T06:50:48-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/10/what-do-you-wish-osquery-could-do/</loc><lastmod>2018-04-10T06:50:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/06/how-to-prepare-for-a-security-audit/</loc><lastmod>2018-04-06T06:50:33-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/</loc><lastmod>2018-04-04T06:50:35-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/23/use-our-suite-of-ethereum-security-tools/</loc><lastmod>2018-03-23T00:28:08-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/</loc><lastmod>2018-03-22T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/</loc><lastmod>2018-03-15T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/09/echidna-a-smart-fuzzer-for-ethereum/</loc><lastmod>2018-03-09T13:19:34-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/03/08/2017-in-review/</loc><lastmod>2018-03-08T07:50:56-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/02/09/parity-technologies-engages-trail-of-bits/</loc><lastmod>2018-02-09T07:50:46-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/</loc><lastmod>2018-01-30T07:50:39-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/</loc><lastmod>2018-01-23T07:50:03-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/</loc><lastmod>2017-12-22T07:50:57-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/22/videos-from-ethereum-focused-empire-hacking/</loc><lastmod>2017-12-22T07:50:57-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/21/osquery-pain-points/</loc><lastmod>2017-12-21T07:50:08-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/12/14/announcing-the-trail-of-bits-osquery-extension-repository/</loc><lastmod>2017-12-14T08:51:41-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/22/securing-ethereum-at-empire-hacking/</loc><lastmod>2017-11-22T07:50:31-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/09/how-are-teams-currently-using-osquery/</loc><lastmod>2017-11-09T08:10:26-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/11/06/hands-on-the-ethernaut-ctf/</loc><lastmod>2017-11-06T14:32:19-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/19/trail-of-bits-joins-the-enterprise-ethereum-alliance/</loc><lastmod>2017-10-19T07:50:38-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/16/our-team-is-growing/</loc><lastmod>2017-10-16T07:50:25-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/12/ios-jailbreak-detection-toolkit-now-available/</loc><lastmod>2017-10-12T07:50:22-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/</loc><lastmod>2017-10-10T08:53:35-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/08/02/microsoft-didnt-sandbox-windows-defender-so-i-did/</loc><lastmod>2017-08-02T06:50:55-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/</loc><lastmod>2017-07-30T18:41:30-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/douglas-gastonguay/</loc><lastmod>2017-05-15T07:50:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/05/15/magic-with-manticore/</loc><lastmod>2017-05-15T07:50:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/04/27/manticore-symbolic-execution-for-humans/</loc><lastmod>2017-04-27T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/mark-mossberg/</loc><lastmod>2017-04-27T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/04/14/a-walk-down-memory-lane/</loc><lastmod>2017-04-14T06:50:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/03/23/april-means-infiltrate/</loc><lastmod>2017-03-23T06:50:49-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/03/14/mcsema-im-liftin-it/</loc><lastmod>2017-03-14T06:50:41-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/</loc><lastmod>2017-02-20T09:15:41-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/</loc><lastmod>2017-02-16T06:50:08-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/</loc><lastmod>2017-02-13T06:50:32-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/</loc><lastmod>2017-01-31T06:50:09-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2017/01/09/2016-year-in-review/</loc><lastmod>2017-01-09T08:28:15-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/</loc><lastmod>2016-12-27T06:00:29-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/</loc><lastmod>2016-12-27T06:00:29-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/</loc><lastmod>2016-12-12T07:50:41-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/</loc><lastmod>2016-11-02T07:50:40-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/26/come-find-us-at-oreilly-security/</loc><lastmod>2016-10-26T07:50:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/</loc><lastmod>2016-10-17T07:50:15-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/10/04/first-ever-automated-code-audit/</loc><lastmod>2016-10-04T07:50:46-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/</loc><lastmod>2016-09-27T07:50:01-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/09/12/plug-into-new-yorks-infosec-community/</loc><lastmod>2016-09-12T07:00:35-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/09/work-for-us-fall-and-winter-internship-opportunities/</loc><lastmod>2016-08-09T07:50:59-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/02/engineering-solutions-to-hard-program-analysis-problems/</loc><lastmod>2016-08-02T07:50:34-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/08/01/your-tool-works-better-than-mine-prove-it/</loc><lastmod>2016-08-01T07:50:18-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/</loc><lastmod>2016-07-11T23:37:27-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/28/start-using-the-secure-enclave-crypto-api/</loc><lastmod>2016-06-28T07:50:42-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/</loc><lastmod>2016-06-23T07:50:59-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/</loc><lastmod>2016-06-03T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/19/empire-hacking-turns-one/</loc><lastmod>2016-05-19T07:50:13-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/18/protofuzz-a-protobuf-fuzzer/</loc><lastmod>2016-05-18T07:50:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/yan-ivnitskiy/</loc><lastmod>2016-05-18T07:50:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/</loc><lastmod>2016-05-05T16:56:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/04/01/hacker-handle-bounty/</loc><lastmod>2016-04-01T07:50:44-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/</loc><lastmod>2016-03-09T13:53:34-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/</loc><lastmod>2016-02-17T02:42:34-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/</loc><lastmod>2016-02-09T06:50:54-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/04/join-us-at-code-as-craft/</loc><lastmod>2016-02-04T07:50:24-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/02/02/software-security-ideas-ahead-of-their-time/</loc><lastmod>2016-02-02T07:50:18-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/</loc><lastmod>2016-01-13T07:50:25-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/07/2015-in-review/</loc><lastmod>2016-01-07T00:00:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2016/01/05/lets-encrypt-the-internet/</loc><lastmod>2016-01-05T07:50:59-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/</loc><lastmod>2015-12-15T08:00:24-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/12/15/self-hosted-video-chat-with-tuber/</loc><lastmod>2015-12-15T08:00:24-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/10/30/why-we-give-so-much-to-csaw/</loc><lastmod>2015-10-30T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/loren-maggiore/</loc><lastmod>2015-09-10T07:50:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/09/10/summer-trail-of-bits/</loc><lastmod>2015-09-10T07:50:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/</loc><lastmod>2015-09-09T07:50:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/</loc><lastmod>2015-07-21T07:50:01-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/</loc><lastmod>2015-07-15T07:00:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/</loc><lastmod>2015-07-07T14:52:12-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/06/08/introducing-the-rubysec-field-guide/</loc><lastmod>2015-06-08T07:50:54-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/05/13/closing-the-windows-gap/</loc><lastmod>2015-05-13T17:26:29-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/05/05/empire-hacking/</loc><lastmod>2015-05-05T14:50:58-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2015/01/05/the-foundation-of-2015-2014-in-review/</loc><lastmod>2015-01-05T07:50:00-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/</loc><lastmod>2014-12-04T08:50:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/</loc><lastmod>2014-12-04T08:50:36-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/</loc><lastmod>2014-11-25T08:50:54-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/10/02/threads-14-scaling-security/</loc><lastmod>2014-10-02T08:00:20-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/</loc><lastmod>2014-09-29T08:50:11-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/</loc><lastmod>2014-09-02T17:00:37-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/nick-depetrillo/</loc><lastmod>2014-09-02T17:00:37-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/</loc><lastmod>2014-08-20T08:50:45-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/07/mcsema-is-officially-open-source/</loc><lastmod>2014-08-07T08:50:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/08/01/education-initiative-spotlight-threads-call-for-papers/</loc><lastmod>2014-08-01T08:50:49-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/30/education-initiative-spotlight-build-it-break-it/</loc><lastmod>2014-07-30T02:10:03-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/28/education-initiative-spotlight-csaw-summer-program-for-women/</loc><lastmod>2014-07-28T08:50:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/07/15/trail-of-bits-adds-mobile-security-researcher-nicholas-depetrillo-to-growing-team/</loc><lastmod>2014-07-15T08:50:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/</loc><lastmod>2014-06-23T09:00:21-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/04/weve-moved/</loc><lastmod>2014-06-04T00:00:00-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/06/03/dear-darpa-challenge-accepted/</loc><lastmod>2014-06-03T18:45:41-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/05/20/trail-of-bits-releases-capture-the-flag-field-guide/</loc><lastmod>2014-05-20T09:00:33-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/andrew-ruef/</loc><lastmod>2014-04-27T12:25:50-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/04/27/using-static-analysis-and-clang-to-find-heartbleed/</loc><lastmod>2014-04-27T12:25:50-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/02/24/introducing-javelin/</loc><lastmod>2014-02-24T08:44:38-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2014/02/23/semantic-analysis-of-native-programs-introducing-codereason/</loc><lastmod>2014-02-23T22:59:13-05:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/</loc><lastmod>2013-07-24T12:53:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/07/24/iverify-is-now-available-on-github/</loc><lastmod>2013-07-24T12:53:09-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/06/03/free-ruby-security-workshop/</loc><lastmod>2013-06-03T12:15:50-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/20/writing-exploits-with-the-elderwood-kit-part-2/</loc><lastmod>2013-05-20T11:34:05-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/14/writing-exploits-with-the-elderwood-kit-part-1/</loc><lastmod>2013-05-14T12:00:57-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2013/05/13/elderwood-and-the-department-of-labor-hack/</loc><lastmod>2013-05-13T12:00:10-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2012/</loc><lastmod>2012-10-29T11:36:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2012/10/29/ending-the-love-affair-with-exploitshield/</loc><lastmod>2012-10-29T11:36:24-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/authors/alex-sotirov/</loc><lastmod>2012-06-11T15:59:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/2012/06/11/analyzing-the-md5-collision-in-flame/</loc><lastmod>2012-06-11T15:59:47-04:00</lastmod></url><url><loc>https://blog.trailofbits.com/tags/</loc></url></urlset>