<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ben-holland.com/hello-world/</loc>
<lastmod>2015-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/program-analysis/</loc>
<lastmod>2016-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/call-graph-construction-algorithms-explained/</loc>
<lastmod>2016-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/2016-review/</loc>
<lastmod>2017-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/av-evasion/</loc>
<lastmod>2017-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/anlcdc2017/</loc>
<lastmod>2017-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/pac/</loc>
<lastmod>2017-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/mac-and-cheese/</loc>
<lastmod>2017-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/pac2020/</loc>
<lastmod>2020-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/skynet/</loc>
<lastmod>2025-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/</loc>
</url>
<url>
<loc>https://ben-holland.com/projects/</loc>
</url>
<url>
<loc>https://ben-holland.com/publications/</loc>
</url>
<url>
<loc>https://ben-holland.com/thoughts/</loc>
</url>
<url>
<loc>https://ben-holland.com/fliers/Cybersecurity-Seminar-Series-110716-BenHolland.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/googlefe7734a97a09f217.html</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/A_Human-in-the-loop_Approach_for_Resolving_Complex_Software_Anomalies.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Catastrophic_Cyber-Physical_Malware.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Computing_Homomorphic_Program_Invariants.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Computing_Relevant_Program_Behaviors.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/DISCOVER.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/DynaDoc.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Enabling_OSINT_in_Private_Social_Networks.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Human-on-the-loop_Automation_SSVs.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/IA_Loop_Characterizations.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Interactive_Visualization_Toolbox_to_Detect_Sophisticated_Android_Malware.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Mockingbird.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Revealing_Privacy_in_Online_Social_Networks.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Security_Toolbox_for_Detecting_Novel_and_Sophisticated_Android_Malware.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Statically-informed_Dynamic_Analysis_Tools_to_Detect_Algorithmic_Complexity_Vulnerabilities.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/papers/Transferring_State-of-the-art_Immutability_Analyses.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/A_Bug_or_Malware.pdf</loc>
<lastmod>2025-05-29T01:53:33+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Developing_Managed_Code_Rootkits.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Examining_Side_Channel_Leaks_in_Web_Apps.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/FinalDefense.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Homebrewing_for_Hackers.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/JReFrameworker-OneYearLater.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Learning_to_Think_Like_a_Hacker.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Recent_Trends_in_Program_Analysis.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/SCAM2016.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/StealingWebBrowserCookies.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
<url>
<loc>https://ben-holland.com/slides/Thinking_on_Uses_of_Dynamic_Analysis_for_Software_Security.pdf</loc>
<lastmod>2025-05-29T01:53:34+00:00</lastmod>
</url>
</urlset>
