<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[For this #ThrowbackThursday, we will look at #ACSAC2025&#x27;s Reverse Engineering and Vulnerability Detection session.]]></title><description><![CDATA[<p>For this <a href="https://infosec.exchange/tags/ThrowbackThursday" rel="tag">#<span>ThrowbackThursday</span></a>, we will look at <a href="https://infosec.exchange/tags/ACSAC2025" rel="tag">#<span>ACSAC2025</span></a>'s Reverse Engineering and Vulnerability Detection session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/533/652/418/106/622/original/88baad441e70e9d0.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/f342e0e2-a0da-4765-87f6-7765e1495073/for-this-throwbackthursday-we-will-look-at-acsac2025-s-reverse-engineering-and-vulnerability-detection-session.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:41:53 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/f342e0e2-a0da-4765-87f6-7765e1495073.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 07 May 2026 14:00:21 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to For this #ThrowbackThursday, we will look at #ACSAC2025&#x27;s Reverse Engineering and Vulnerability Detection session. on Thu, 07 May 2026 14:00:26 GMT]]></title><description><![CDATA[<p>Opening the session was Anwar et al.'s "VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming" on rapidly verifying affected software versions and correcting advisory misclassifications. (<a href="https://www.acsac.org/2025/program/final/s53.html" rel="nofollow noopener"><span>https://www.</span><span>acsac.org/2025/program/final/s</span><span>53.html</span></a>) 2/6<br /><a href="https://infosec.exchange/tags/CyberSecurity" rel="tag">#<span>CyberSecurity</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/533/652/781/972/901/original/8a662e43cf821b86.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/ACSAC_Conf/statuses/116533652792124303</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/ACSAC_Conf/statuses/116533652792124303</guid><dc:creator><![CDATA[acsac_conf@infosec.exchange]]></dc:creator><pubDate>Thu, 07 May 2026 14:00:26 GMT</pubDate></item></channel></rss>