<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with acsac2025]]></title><description><![CDATA[A list of topics that have been tagged with acsac2025]]></description><link>https://board.circlewithadot.net/tags/acsac2025</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:37:27 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/acsac2025.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[For this #ThrowbackThursday, we will look at #ACSAC2025&#x27;s Reverse Engineering and Vulnerability Detection session.]]></title><description><![CDATA[Opening the session was Anwar et al.'s "VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming" on rapidly verifying affected software versions and correcting advisory misclassifications. (https://www.acsac.org/2025/program/final/s53.html) 2/6#CyberSecurity]]></description><link>https://board.circlewithadot.net/topic/f342e0e2-a0da-4765-87f6-7765e1495073/for-this-throwbackthursday-we-will-look-at-acsac2025-s-reverse-engineering-and-vulnerability-detection-session.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/f342e0e2-a0da-4765-87f6-7765e1495073/for-this-throwbackthursday-we-will-look-at-acsac2025-s-reverse-engineering-and-vulnerability-detection-session.</guid><dc:creator><![CDATA[acsac_conf@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>