<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://adamdoupe.com/blog/2023/01/23/cve-2023-23504-xnu-heap-underwrite-in-dlil-dot-c/</loc>
<lastmod>2023-01-23T14:47:00-05:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2022/12/13/cve-2022-42845-xnu-use-after-free-vulnerability-in-ndrv-dot-c/</loc>
<lastmod>2022-12-13T17:27:26-08:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2016/10/07/tokyo-western-mma-2016-walkthrough-judgement/</loc>
<lastmod>2016-10-07T22:13:28-07:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2016/09/09/talk-a-computer-in-every-pocket-securing-mobile-applications/</loc>
<lastmod>2016-09-09T12:02:26-07:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2016/06/30/owasp-phoenix-talk-on-black-box-web-vulnerability-scanners/</loc>
<lastmod>2016-06-30T08:49:52-07:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2015/11/18/guest-lecture-on-cross-site-scripting-for-cse-466/</loc>
<lastmod>2015-11-18T10:20:08-07:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/09/26/found-stored-xss-in-popular-dots-game/</loc>
<lastmod>2013-09-26T08:25:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/09/10/agile-in-the-cs-classroom/</loc>
<lastmod>2013-09-10T08:21:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/09/05/dedacota-toward-preventing-server-side-xss-via-automatic-code-and-data-separation/</loc>
<lastmod>2013-09-05T18:13:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/09/02/back-that-data-up-a-cautionary-tale/</loc>
<lastmod>2013-09-02T16:42:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/07/16/ssh-to-server-in-same-directory/</loc>
<lastmod>2013-07-16T15:19:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/04/10/picoctf-preparations/</loc>
<lastmod>2013-04-10T16:26:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2013/04/03/some-classic-literature-recommendations/</loc>
<lastmod>2013-04-03T15:51:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2011/04/20/overview-of-execution-after-redirect-web-application-vulnerabilities/</loc>
<lastmod>2011-04-20T21:10:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2011/01/27/paper-review-saner-composing-static-and-dynamic-analysis-to-validate-sanitization-in-web-applications/</loc>
<lastmod>2011-01-27T21:05:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2010/10/28/compiling-jpcap-on-64-bit-ubuntu-10-dot-10/</loc>
<lastmod>2010-10-28T20:59:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2010/10/27/redirecting-a-folder-to-https-with-apaches-config-on-ubuntu/</loc>
<lastmod>2010-10-27T20:54:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2010/10/22/configuring-linux-bridge-to-act-as-a-hub/</loc>
<lastmod>2010-10-22T20:49:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2009/05/05/another-fire-in-the-santa-barbara-hills/</loc>
<lastmod>2009-05-05T20:39:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2009/04/10/two-chicks-at-the-same-time/</loc>
<lastmod>2009-04-10T20:33:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2009/04/07/enabling-total-dns-on-godaddy/</loc>
<lastmod>2009-04-07T20:25:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/blog/2009/04/03/doing-research/</loc>
<lastmod>2009-04-03T17:52:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/365-syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignment_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignment_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/assignment_4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/assignment_4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignment_6.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignment_6.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignment_6.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignments.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/complex_assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/ctf_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/ctf_1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/ctf_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/ctf_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/ctf_3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/ctfs.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/ctfs.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/future.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/future.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/research/</loc>
</url>
<url>
<loc>http://adamdoupe.com/</loc>
</url>
<url>
<loc>http://adamdoupe.com/publications/</loc>
</url>
<url>
<loc>http://adamdoupe.com/blog/</loc>
</url>
<url>
<loc>http://adamdoupe.com/blog/archives/</loc>
</url>
<url>
<loc>http://adamdoupe.com/cv/</loc>
</url>
<url>
<loc>http://adamdoupe.com/service/</loc>
</url>
<url>
<loc>http://adamdoupe.com/media/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse691-current-topics-in-cybersecurity-s22/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/papers.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/project-1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/project-1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/project-1.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/project-2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/project-2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/project-2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/project-3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/project-3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/project-3.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/project-4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/project-4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/project-4.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/project-5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/project-5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/project-5.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/projects.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/simple_assignment_2.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s17/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s18/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse545-software-security-s16/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse691-current-topics-in-cybersecurity-s22/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f19/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-information-assurance-f18/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse365-intro-information-assurance-s20/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse465-information-assurance-f17/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/syllabus.html</loc>
</url>
<url>
<loc>http://adamdoupe.com/VULCAN%E2%80%94Kickoff%20Meeting%E2%80%9411-25-25.pdf</loc>
<lastmod>2025-12-15T19:23:09+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/certphishing-asiaccs21.pdf</loc>
<lastmod>2022-05-17T17:45:06+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/users-really-do-answer-phone-scams-usenix2019.pdf</loc>
<lastmod>2019-08-15T23:38:16+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/understanding-and-detecting-private-interactions-in-underground-forums-codaspy2019.pdf</loc>
<lastmod>2019-01-27T22:58:54+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/cachelight-ashes18.pdf</loc>
<lastmod>2019-01-27T22:52:03+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/crawlphish-oakland21.pdf</loc>
<lastmod>2020-08-18T17:23:12+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/phishtime_usenix_2020.pdf</loc>
<lastmod>2020-08-18T17:13:10+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/mutated-policies-towards-mtd2017.pdf</loc>
<lastmod>2017-10-03T18:34:03+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/sailr-usenix2024.pdf</loc>
<lastmod>2024-10-18T04:25:24+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/checking-intent-based-communication-in-android-asiaccs2016.pdf</loc>
<lastmod>2016-03-11T23:25:18+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/mango-usenix2024.pdf</loc>
<lastmod>2024-10-18T04:10:27+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/matched-and-mismatched-socs-ccs2019.pdf</loc>
<lastmod>2019-10-03T15:32:42+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/page-spray-usenix2024.pdf</loc>
<lastmod>2024-10-18T02:20:41+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/peer-review-process-oakland22.pdf</loc>
<lastmod>2022-05-17T18:18:05+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/asiaccs20-sqlblock.pdf</loc>
<lastmod>2020-06-04T20:39:14+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/federated-access-management-sacmat2015.pdf</loc>
<lastmod>2015-04-17T17:02:26+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/advanced-automated-web-application-vulnerability-analysis-dissertation2014.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/client-side-anti-phishing-asiaccs2024.pdf</loc>
<lastmod>2025-01-20T21:29:35+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/mtd-web-applications-stackelberg-aamas2016.pdf</loc>
<lastmod>2017-02-10T18:04:41+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/tygr-usenix2024.pdf</loc>
<lastmod>2024-10-18T04:50:57+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/10-years-ictf-3gse2014.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/statemon-state-aware-network-access-management-for-sdn.pdf</loc>
<lastmod>2016-05-20T20:41:44+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/caaas-usenix21.pdf</loc>
<lastmod>2021-08-13T02:29:32+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/icore-sac19.pdf</loc>
<lastmod>2019-03-11T23:00:25+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/varbert-oakland2024.pdf</loc>
<lastmod>2024-05-20T21:00:26+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/large-scale-study-of-mobile-web-app-security-most2015.pdf</loc>
<lastmod>2015-05-21T03:58:55+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/phishfarm-oakland2019.pdf</loc>
<lastmod>2019-01-27T23:04:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/still-cant-pentest-techreport2015.pdf</loc>
<lastmod>2015-07-19T03:26:28+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/honeyplc-ccs2020.pdf</loc>
<lastmod>2020-09-22T18:30:40+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/greenhouse-usenix2023.pdf</loc>
<lastmod>2023-11-03T01:12:09+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/frankenstein-rci-oakland2025.pdf</loc>
<lastmod>2025-10-28T19:21:42+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/kheaps-exploit-reliability-usenix22.pdf</loc>
<lastmod>2022-08-10T13:53:40+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/ieee-comm-std-callerid.pdf</loc>
<lastmod>2018-01-08T19:36:38+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/deep-android-malware-detection-codaspy2017.pdf</loc>
<lastmod>2017-03-24T00:20:28+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/aim-sdn-attacking-ccs2018.pdf</loc>
<lastmod>2019-01-27T23:19:57+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/simulacrum-usenix22.pdf</loc>
<lastmod>2022-08-10T15:41:33+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/do-you-feel-lucky-sac2014.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/hit-em-where-it-hurts-acsac2011.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/favocado-ndss21.pdf</loc>
<lastmod>2021-02-10T04:29:21+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/challenges-sdn-firewalls-sdnnfv2018.pdf</loc>
<lastmod>2018-04-23T15:21:47+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/OF-security-and-privacy-usenix2024.pdf</loc>
<lastmod>2024-10-18T04:34:01+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/above-and-beyond-ndss2022.pdf</loc>
<lastmod>2022-04-27T21:44:31+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/ropbot-ndss2026.pdf</loc>
<lastmod>2026-01-28T23:30:21+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/browser-polygraph-imc2024.pdf</loc>
<lastmod>2024-10-15T02:58:48+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/ecrime2018_phishers_mind_oest.pdf</loc>
<lastmod>2018-06-11T15:43:12+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/covid-phishing-ecrime20.pdf</loc>
<lastmod>2021-02-10T03:40:15+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/dedacota-ccs2013.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/sdn-resilience-ccsw2025.pdf</loc>
<lastmod>2025-10-28T20:01:11+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/decompiling-synergy-ndss2026.pdf</loc>
<lastmod>2026-01-28T23:33:18+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/context-auditor-raid2022.pdf</loc>
<lastmod>2022-11-14T23:35:47+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/leak-kptr-woot20.pdf</loc>
<lastmod>2020-08-18T17:06:25+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/fuzzsense-cns20.pdf</loc>
<lastmod>2020-06-04T21:15:23+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/fear-the-ear-ccs2011.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/flakjack-ccs24.pdf</loc>
<lastmod>2024-10-18T05:18:10+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/pwn-college-five-years-sigcse2026.pdf</loc>
<lastmod>2026-01-28T23:21:39+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/going-native-ndss2016.pdf</loc>
<lastmod>2015-12-30T03:24:33+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/prd-tdsc2024.pdf</loc>
<lastmod>2025-01-20T22:22:47+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/ears-in-the-wild-sac2013.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/sok-everyone-hates-robocalls-oakland2016.pdf</loc>
<lastmod>2016-03-22T16:37:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/spartacus-ccs2022.pdf</loc>
<lastmod>2022-11-14T21:41:13+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/black-box-scanners-dimva2010.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/taveren-ndss2026.pdf</loc>
<lastmod>2026-01-28T23:25:25+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/witcher-oakland2023.pdf</loc>
<lastmod>2022-11-14T22:01:39+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/target-fragmentation-in-android-apps-most2016.pdf</loc>
<lastmod>2016-03-25T19:02:38+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/wi-not-calling-acsac2018.pdf</loc>
<lastmod>1544-04-28T19:00:00+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/scammagnifier-ndss2025.pdf</loc>
<lastmod>2025-01-20T22:08:13+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/system-register-hijacking-usenix2025.pdf</loc>
<lastmod>2025-10-28T18:03:07+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/reporting-gap-raid2024.pdf</loc>
<lastmod>2024-10-18T02:12:08+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/nothing-personal-codaspy2024.pdf</loc>
<lastmod>2024-10-18T05:50:35+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/email-header-injection-vulns-it2017.pdf</loc>
<lastmod>2017-05-30T16:57:54+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/linux-luminarium-sigcse2026.pdf</loc>
<lastmod>2026-01-28T23:19:44+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/deception-in-markov-game-with-CTFs-gamesec2022.pdf</loc>
<lastmod>2022-11-14T00:16:32+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/spider-scents-usenix2024.pdf</loc>
<lastmod>2024-10-18T04:44:30+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/beyondphish-oakland2023.pdf</loc>
<lastmod>2023-05-23T23:26:57+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/toward-a-moving-target-defense-for-web-applications.pdf</loc>
<lastmod>2015-07-24T19:17:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/email-header-injections-sac2018.pdf</loc>
<lastmod>2018-04-10T09:11:15+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/towards-mtd-abac-abac2016.pdf</loc>
<lastmod>2016-01-22T23:20:13+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/sensai-cigcse2025.pdf</loc>
<lastmod>2025-03-26T06:22:31+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/honeyproxy-cns2017.pdf</loc>
<lastmod>2017-09-19T17:56:10+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/smokebomb-mobisys20.pdf</loc>
<lastmod>2020-06-04T21:00:39+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/game-theoretic-approach-of-strategy-generation-for-mtd-aamas2017.pdf</loc>
<lastmod>2017-03-24T00:34:24+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/behind-closed-doors-ecrime2016.pdf</loc>
<lastmod>2016-04-26T21:27:22+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/retspill-ccs2023.pdf</loc>
<lastmod>2024-01-10T00:30:09+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/prep-gecco2022.pdf</loc>
<lastmod>2022-11-14T23:51:13+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/enemy-of-the-state-usenix2012.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/bitcoin-mixers-fc2021.pdf</loc>
<lastmod>2021-02-01T23:07:10+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/writing-groups-in-computer-science-research-labs-fie2013.pdf</loc>
<lastmod>2014-10-02T21:10:56+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/everyone-is-different-defending-extension-fingerprinting-usenix2019.pdf</loc>
<lastmod>2019-08-16T00:30:18+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/goldenhour-usenix2020.pdf</loc>
<lastmod>2020-06-16T04:08:17+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/shell-we-play-a-game-ctf-as-a-service-ase2017.pdf</loc>
<lastmod>2017-08-15T15:58:45+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/prime-count-covert-channel-acsac2018.pdf</loc>
<lastmod>2018-12-05T20:48:02+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/sandpuppy-dimva2024.pdf</loc>
<lastmod>2025-01-20T21:35:55+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/scamnet-aaai2025.pdf</loc>
<lastmod>2025-01-20T22:14:14+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/hacker-mistakes-oakland2024.pdf</loc>
<lastmod>2024-05-20T20:51:12+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/vik-asplos22.pdf</loc>
<lastmod>2022-05-17T18:03:59+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/dbling-identifying-extensions-installed-on-encrypted-web-thing-clients.pdf</loc>
<lastmod>2016-05-20T21:00:32+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/towards-automated-threat-intelligence-fusion-cic2016.pdf</loc>
<lastmod>2016-10-20T17:41:57+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/arbiter-usenix22.pdf</loc>
<lastmod>2022-08-10T15:10:16+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/honeymix-toward-honeynet-sdnnfvsec2016.pdf</loc>
<lastmod>2016-01-21T22:50:05+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/eirene-sdn-threats-ccsw2022.pdf</loc>
<lastmod>2022-11-14T21:35:51+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/honey-patching-hiccs20.pdf</loc>
<lastmod>2021-02-10T04:14:55+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/toward-authenticated-caller-id-transmission-itu2016.pdf</loc>
<lastmod>2016-11-07T23:24:10+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/publications/lte-privacy-dsn2024.pdf</loc>
<lastmod>2024-01-10T00:53:28+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/slides/Hindley-MilnerTypeChecking-Mohsen-Zohrevandi.pdf</loc>
<lastmod>2015-10-20T01:25:48+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f15/cse340_F15_programming_projects.pdf</loc>
<lastmod>2015-08-24T15:46:16+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/cse340_s16_programming_projects.pdf</loc>
<lastmod>2016-01-15T13:43:28+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-s16/cse340_F15_programming_projects.pdf</loc>
<lastmod>2015-12-29T19:33:40+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/CSE340Su16_CentOS_Guide.pdf</loc>
<lastmod>2016-08-19T05:19:55+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/cse340_s16_programming_projects.pdf</loc>
<lastmod>2016-08-08T21:49:12+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/cse340_F15_programming_projects.pdf</loc>
<lastmod>2016-08-08T21:49:12+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse340-principles-of-programming-languages-f16/CSE340F16_CentOS_Guide.pdf</loc>
<lastmod>2016-08-19T05:34:45+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignment_1/GuestbookClientTest.html</loc>
<lastmod>2015-01-26T01:40:48+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/teaching/classes/cse591-security-and-vulnerability-analysis-s15/assignment_1/CalculatorClientTest.html</loc>
<lastmod>2015-01-26T01:40:48+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/x.html</loc>
<lastmod>2020-08-23T01:31:17+00:00</lastmod>
</url>
<url>
<loc>http://adamdoupe.com/adam_doupe_cv.pdf</loc>
<lastmod>2025-03-26T03:43:24+00:00</lastmod>
</url>
</urlset>
