{"id":74071,"date":"2018-02-20T21:40:48","date_gmt":"2018-02-20T21:40:48","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/"},"modified":"2025-11-14T15:23:19","modified_gmt":"2025-11-14T15:23:19","slug":"ndss-2018-automating-process-vulnerability-discovery","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/","title":{"rendered":"NDSS 2018: automatizando el proceso de detecci\u00f3n de vulnerabilidades"},"content":{"rendered":"<p><a href=\"https:\/\/www.ndss-symposium.org\/\">NDSS 2018<\/a> est\u00e1 en pleno apogeo en San Diego esta semana y un par de documentos que realmente me llamaron la atenci\u00f3n fueron ayer ambos en la misma sesi\u00f3n\u00a0 en\u00a0<a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/programme\/#02A\">Network Security and Cellular Networks<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/\">Saber m\u00e1s (en ingl\u00e9s)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NDSS 2018 est\u00e1 en pleno apogeo en San Diego esta semana y un par de documentos que realmente me llamaron la atenci\u00f3n fueron ayer ambos en la misma sesi\u00f3n\u00a0 en\u00a0Network Security and Cellular Networks. &nbsp; Saber m\u00e1s (en ingl\u00e9s)<\/p>\n","protected":false},"author":38,"featured_media":65484,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[168,190,179,4910,4777,184],"tags":[6205,3243],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4103],"class_list":["post-74071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-normas-abiertos-de-internet","category-eventos","category-seguridad","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","tag-eventos","tag-simposio-de-seguridad-de-redes-y-sistemas-distribuidos-ndss","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Mat Ford","author_link":"https:\/\/www.internetsociety.org\/es\/author\/ford\/"},"uagb_comment_info":0,"uagb_excerpt":"NDSS 2018 est\u00e1 en pleno apogeo en San Diego esta semana y un par de documentos que realmente me llamaron la atenci\u00f3n fueron ayer ambos en la misma sesi\u00f3n\u00a0 en\u00a0Network Security and Cellular Networks. &nbsp; Saber m\u00e1s (en ingl\u00e9s)","authors":[{"term_id":4103,"user_id":38,"is_guest":0,"slug":"ford","display_name":"Mat Ford","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/74071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=74071"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/74071\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/65484"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=74071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=74071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=74071"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=74071"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=74071"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=74071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}