<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://whisperlab.org/blog/2019/Online-Voting-Proxying-Comes-to-Canada.html</loc>
<lastmod>2019-09-24T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2018/Ten-Reasons-You-Need-TLS-HTTPS-on-Your-Website.html</loc>
<lastmod>2018-09-27T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2018/Ontario-Elections-The-Problem-With-Online-Voting.html</loc>
<lastmod>2018-04-04T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2018/Interview-on-CBCs-The-Current.html</loc>
<lastmod>2018-04-02T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2018/Canadian-Government-Get-Cryptojacked.html</loc>
<lastmod>2018-02-13T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Trust-Implications-of-DDoS-Protection-in-Online-Elections.html</loc>
<lastmod>2017-11-21T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Emering-Role-of-AI-in-Cybersecurity.html</loc>
<lastmod>2017-06-28T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Interview-in-the-Hill-Times.html</loc>
<lastmod>2017-06-27T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/WannaCry-Ransomware.html</loc>
<lastmod>2017-05-19T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Statement-to-Guelph-City-Council-on-Online-Voting.html</loc>
<lastmod>2017-04-25T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/iVote-in-Western-Australia.html</loc>
<lastmod>2017-03-05T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Indiscreet-Logs-Persistent-Diffie-Hellman-Backdoors-in-TLS.html</loc>
<lastmod>2017-02-27T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2017/Ottawa-Citizen-Oped-on-Internet-Voting-Research.html</loc>
<lastmod>2017-01-30T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2016/security-analysis-of-helios.html</loc>
<lastmod>2016-12-08T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2016/Statement-to-Toronto-Executive-Committee.html</loc>
<lastmod>2016-12-01T00:00:00-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2016/Brief-to-Commission-on-Electoral-Reform.html</loc>
<lastmod>2016-10-01T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/blog/2016/Presentation-at-the-Online-Voting-Roundtable.html</loc>
<lastmod>2016-09-28T00:00:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/about</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/assignments/assignment-VM-setup</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/assignments/assignment1</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/assignments/assignment2</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/assignments/assignment3</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/assignments/assignment4</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/bof</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/bof</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/buffer-overflows</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/buffer-overflows</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/collision</loc>
</url>
<url>
<loc>https://whisperlab.org/contact</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/evaluation</loc>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/evaluation</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/evaluation</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/final-study-guide</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/hacking-ethics</loc>
</url>
<url>
<loc>https://whisperlab.org/blog/</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/</loc>
</url>
<url>
<loc>https://whisperlab.org/</loc>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/</loc>
</url>
<url>
<loc>https://whisperlab.org/helios/</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/info</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/info</loc>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/info</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/midterm-review</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/network-exploitation</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/passcode</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/password-hashing</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/schedule</loc>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/schedule</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/schedule</loc>
</url>
<url>
<loc>https://whisperlab.org/support</loc>
</url>
<url>
<loc>https://whisperlab.org/teaching</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/web-exploitation</loc>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/lectures/wifi-exploitation</loc>
</url>
<url>
<loc>https://whisperlab.org/category/internet-voting/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/electronic-voting/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/voting-policy/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/election-policy/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/crypto/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/e2e/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/papers/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/internet-voting/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/voting-policy/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/tls/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/vulnerabilities/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/malware/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/interview/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/ai/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/cybersecurity/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/cryptocurrency/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/cyber-crime/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/ransomware/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/cryptojacking/</loc>
</url>
<url>
<loc>https://whisperlab.org/category/ontario/</loc>
</url>
<url>
<loc>https://whisperlab.org/blog/2/</loc>
</url>
<url>
<loc>https://whisperlab.org/information-security/SE4472-course-outline-2025.pdf</loc>
<lastmod>2025-09-05T15:19:28-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-1.pdf</loc>
<lastmod>2020-09-09T14:56:39-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-10.pdf</loc>
<lastmod>2021-10-27T20:13:26-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-11.pdf</loc>
<lastmod>2021-10-27T20:14:28-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-2a.pdf</loc>
<lastmod>2020-09-16T13:57:04-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-2b.pdf</loc>
<lastmod>2020-09-22T17:26:55-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-3.pdf</loc>
<lastmod>2020-09-30T10:08:45-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-4.pdf</loc>
<lastmod>2020-10-07T10:19:00-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-5.pdf</loc>
<lastmod>2020-10-15T21:19:09-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-6.pdf</loc>
<lastmod>2021-10-27T19:04:41-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-7.pdf</loc>
<lastmod>2021-10-27T20:07:59-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-8.pdf</loc>
<lastmod>2022-11-09T13:48:21-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/lectures/SE4472-week-9.pdf</loc>
<lastmod>2021-10-27T20:12:16-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/information-security/xor-table.pdf</loc>
<lastmod>2020-10-19T14:09:50-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/introduction-to-hacking/ECE9609-course-outline.pdf</loc>
<lastmod>2026-01-14T09:37:54-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/ontario-online-E-Vote-ID.pdf</loc>
<lastmod>2019-07-23T17:42:57-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/ontario-online-credential-attacks.pdf</loc>
<lastmod>2025-10-10T10:27:25-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/ontario-online.pdf</loc>
<lastmod>2020-10-09T16:14:15-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/papers/Helios-ACSAC-16.pdf</loc>
<lastmod>2016-10-11T10:50:42-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/papers/Ontario-Votes-Online.pdf</loc>
<lastmod>2019-07-23T17:47:07-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/papers/SASM_PRL-TIFS-19.pdf</loc>
<lastmod>2019-11-21T14:07:31-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/papers/Trust_Implications_of_DDoS_Prevention_in_Online_Elections.pdf</loc>
<lastmod>2017-08-01T10:02:10-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/technical-reports/de-identification-guideline-WL-2020-01.pdf</loc>
<lastmod>2020-11-26T14:41:53-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/SE3310-CourseOutline-2025.pdf</loc>
<lastmod>2025-08-28T12:00:46-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/exam-review.pdf</loc>
<lastmod>2018-04-12T12:16:15-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/pl-studyguide.pdf</loc>
<lastmod>2018-02-19T11:42:34-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week1.pdf</loc>
<lastmod>2025-09-09T11:05:51-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week10.pdf</loc>
<lastmod>2018-03-23T15:18:42-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week11.pdf</loc>
<lastmod>2016-01-19T13:53:15-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week12.pdf</loc>
<lastmod>2016-04-14T21:10:10-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week13.pdf</loc>
<lastmod>2016-01-19T13:53:46-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week2.pdf</loc>
<lastmod>2017-01-05T12:21:52-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week3.pdf</loc>
<lastmod>2016-01-19T13:51:06-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week4.pdf</loc>
<lastmod>2016-01-26T13:20:22-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week5.pdf</loc>
<lastmod>2016-01-19T13:51:45-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week6.pdf</loc>
<lastmod>2023-04-22T09:25:45-04:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week7.pdf</loc>
<lastmod>2019-02-28T14:51:31-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week8.pdf</loc>
<lastmod>2018-03-09T16:04:37-05:00</lastmod>
</url>
<url>
<loc>https://whisperlab.org/theory-of-computation/lectures/week9.pdf</loc>
<lastmod>2018-03-21T09:56:56-04:00</lastmod>
</url>
</urlset>
