{"id":73613,"date":"2018-02-14T20:02:32","date_gmt":"2018-02-14T20:02:32","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/"},"modified":"2025-11-14T15:23:31","modified_gmt":"2025-11-14T15:23:31","slug":"workshop-binary-analysis-research-bar-2018-ndss-18-february","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/","title":{"rendered":"Taller sobre investigaci\u00f3n de an\u00e1lisis binarios (BAR) 2018 en NDSS el 18 de febrero"},"content":{"rendered":"<p>El an\u00e1lisis binario se refiere al proceso en el que analistas humanos y \/ o sistemas automatizados examinan el c\u00f3digo subyacente en el software para descubrir, explotar y defenderse contra la malicia y las vulnerabilidades, a menudo sin acceso al c\u00f3digo fuente. Mediante la protecci\u00f3n del software heredado implementado en todo tipo de dispositivos y plataformas en el mundo moderno, las t\u00e9cnicas de an\u00e1lisis binario se vuelven cada vez m\u00e1s cr\u00edticas para hacer que nuestra vida cotidiana y nuestra sociedad sean m\u00e1s seguras.<\/p>\n<p>Un Taller sobre Investigaci\u00f3n de An\u00e1lisis Binario (BAR), por sus siglos en ingl\u00e9s: <a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/bar-workshop-programme\/\">Workshop on Binary Analysis Research (BAR)<\/a>se ubicar\u00e1 junto con el Simposio de Seguridad del Sistema Distribuido y de Redes (NDSS), por sus siglos en ingl\u00e9s:\u00a0<a href=\"https:\/\/www.ndss-symposium.org\/\">Network and Distributed System Security Symposium (NDSS)<\/a>, y se celebrar\u00e1 en San Diego, CA, EE. UU., El 18 de febrero de 2018.<\/p>\n<p>Saber m\u00e1s (ingl\u00e9s)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El an\u00e1lisis binario se refiere al proceso en el que analistas humanos y \/ o sistemas automatizados examinan el c\u00f3digo subyacente en el software para descubrir, explotar y defenderse contra la malicia y las vulnerabilidades, a menudo sin acceso al c\u00f3digo fuente. Mediante la protecci\u00f3n del software heredado implementado en todo tipo de dispositivos y [&hellip;]<\/p>\n","protected":false},"author":1332,"featured_media":73614,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[186,190,179,4910,4777,184],"tags":[6205,3243],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4242],"class_list":["post-73613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confianza","category-eventos","category-seguridad","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","tag-eventos","tag-simposio-de-seguridad-de-redes-y-sistemas-distribuidos-ndss","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",4000,2667,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",1536,1024,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",2048,1366,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",600,400,false]},"uagb_author_info":{"display_name":"Fish Wang","author_link":"https:\/\/www.internetsociety.org\/es\/author\/fwang\/"},"uagb_comment_info":0,"uagb_excerpt":"El an\u00e1lisis binario se refiere al proceso en el que analistas humanos y \/ o sistemas automatizados examinan el c\u00f3digo subyacente en el software para descubrir, explotar y defenderse contra la malicia y las vulnerabilidades, a menudo sin acceso al c\u00f3digo fuente. Mediante la protecci\u00f3n del software heredado implementado en todo tipo de dispositivos y&hellip;","authors":[{"term_id":4242,"user_id":1332,"is_guest":0,"slug":"fwang","display_name":"Fish Wang","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/deec6fcfdaf45f7bac99ee20fd97c5502bb171d93879e458d18f12000f3d4a3f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/73613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=73613"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/73613\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/73614"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=73613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=73613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=73613"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=73613"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=73613"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=73613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}