{"id":165689,"date":"2022-04-09T08:34:47","date_gmt":"2022-04-09T08:34:47","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=165689"},"modified":"2025-12-02T15:17:22","modified_gmt":"2025-12-02T15:17:22","slug":"partager-les-dernieres-decouvertes-dans-le-cadre-du-symposium-ndss","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/action-plan\/ndss-symposium\/","title":{"rendered":"Le Symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (NDSS)"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Partager les derni\u00e8res d\u00e9couvertes <br>en mati\u00e8re de s\u00e9curit\u00e9 <br>dans le cadre du Symposium NDSS<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-32-font-size\">Pour que l&rsquo;Internet reste robuste et r\u00e9silient, nous avons besoin de renforcer la recherche et la collaboration sur ses probl\u00e8mes de s\u00e9curit\u00e9.<\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:67%\">\n<p class=\"has-18-font-size\"><a href=\"https:\/\/www.ndss-symposium.org\/\">Le Network and Distributed System Security (NDSS) Symposium<\/a> (symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s) est une conf\u00e9rence universitaire internationale sur la s\u00e9curit\u00e9, qui se concentre sur les derni\u00e8res avanc\u00e9es en mati\u00e8re de s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Depuis 30 ans, le symposium rassemble des chercheurs universitaires et industriels ainsi que des professionnels de la s\u00e9curit\u00e9 du monde entier pour partager des connaissances et discuter de recherches de premier plan \u00e9valu\u00e9es par des pairs.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Le symposium est devenu l\u2019une des principales conf\u00e9rences mondiales sur la s\u00e9curit\u00e9, qui attire des participants du monde entier.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33%\">\n<p class=\"has-neutral-white-background-color has-background has-18-font-size\"><span style=\"font-size: 14px;\">Le Symposium, qui s\u2019appelait \u00e0 l\u2019origine Workshop on Network and Distributed System Security, a \u00e9t\u00e9 organis\u00e9 pour la premi\u00e8re fois du du 11 au 12 f\u00e9vrier 1993 \u00e0 San Diego, en Californie. Il tenait lieu de colloque du groupe Recherche sur la confidentialit\u00e9 et la s\u00e9curit\u00e9 de l&rsquo;Internet Research Task Force, et \u00e9tait organis\u00e9 par l&rsquo;Internet Society et le Lawrence Livermore National Laboratory. L&rsquo;Internet Society est fi\u00e8re d&rsquo;organiser le Symposium NDSS depuis lors. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:67%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop uag-hide-tab\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-ed69b982 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Symposium NDSS 2025<\/h3><\/div><p class=\"uagb-ifb-desc\">Le Symposium NDSS 2025 s&rsquo;est tenu du 24 au 28 f\u00e9vrier 2025 \u00e0 San Diego, en Californie. Parmi les participants figurent des chercheurs et des enseignants universitaires, des directeurs de la technologie et de la confidentialit\u00e9, des analystes de la s\u00e9curit\u00e9, des administrateurs syst\u00e8me et des responsables de la s\u00e9curit\u00e9 et des op\u00e9rations.<\/p><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-depth-green-background-color has-background wp-element-button\" href=\"https:\/\/www.ndss-symposium.org\/ndss2025\/\"><strong>D\u00e9couvrez ce qui s&rsquo;est pass\u00e9<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33%\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"NDSS Symposium Overview\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1DyWJwcgn1k?feature=oembed&#038;enablejsapi=1&#038;origin=https:\/\/www.internetsociety.org\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\">Lutter contre le manque de confiance \u00e0 l\u2019\u00e9gard de l\u2019Internet<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Gr\u00e2ce au partage collaboratif de recherches de pointe sur la s\u00e9curit\u00e9 des syst\u00e8mes, le Symposium NDSS aide la communaut\u00e9 d&rsquo;Internet \u00e0 rendre Internet plus s\u00fbr:<\/p>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>De nouvelles attaques et vuln\u00e9rabilit\u00e9s potentielles peuvent \u00eatre identifi\u00e9es, att\u00e9nu\u00e9es et pr\u00e9sent\u00e9es de mani\u00e8re ouverte et accessible.<\/li>\n\n\n\n<li>De nouvelles technologies de s\u00e9curit\u00e9 peuvent \u00eatre d\u00e9velopp\u00e9es, publi\u00e9es, et m\u00eame normalis\u00e9es, de mani\u00e8re ouverte et accessible<\/li>\n\n\n\n<li>La prochaine g\u00e9n\u00e9ration de chercheurs et d&rsquo;acteurs de la s\u00e9curit\u00e9 y trouve un tremplin, qui lui permet de d\u00e9velopper un important r\u00e9seau professionnel.&nbsp;<\/li>\n\n\n\n<li>Les communaut\u00e9s de l&rsquo;universit\u00e9, de l&rsquo;entreprise et de la normalisation peuvent mieux comprendre les probl\u00e8mes de s\u00e9curit\u00e9 qui font leur apparition et leurs solutions, et seront plus \u00e0 m\u00eame de collaborer pour les r\u00e9soudre.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\">Participer<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"599\" height=\"275\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/people-talk-ndss-min.jpg\" alt=\"A diverse group of individuals gathered in a room, engaged in conversation\" class=\"wp-image-207598\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/people-talk-ndss-min.jpg 599w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/people-talk-ndss-min-450x207.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/people-talk-ndss-min-250x115.jpg 250w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6e38d95b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.ndss-symposium.org\/previous-conferences\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Obtenir le plus possible de l&rsquo;ouverture de l&rsquo;acc\u00e8s \u00e0 la recherche <\/h5><\/div><p class=\"uagb-ifb-desc\">Tous les articles de recherche accept\u00e9s par le Symposium NDSS sont accessibles \u00e0 tous, partout, de m\u00eame que les diapositives et les vid\u00e9os des pr\u00e9sentations. Cet acc\u00e8s ouvert renforce la recherche collaborative, et repr\u00e9sente l&rsquo;un des aspects les plus positifs du symposium. <\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"200\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/Small-NDSS-Symposium-2019-1-e1644248454872.jpg\" alt=\"Three transparent glass award plaques on a table\" class=\"wp-image-164048\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/Small-NDSS-Symposium-2019-1-e1644248454872.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/Small-NDSS-Symposium-2019-1-e1644248454872-250x111.jpg 250w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">\u00c0 l&rsquo;\u00e9preuve du temps <\/h5><\/div><p class=\"uagb-ifb-desc\">Chaque ann\u00e9e, le prix Test of Time r\u00e9compense des articles du Symposium NDSS publi\u00e9s il y a plus de dix ans, et ayant eu un impact important sur le monde universitaire et industriel. Ce fait de rendre hommage \u00e0 ces articles met en lumi\u00e8re l\u2019importance des recherches fondamentales r\u00e9alis\u00e9es au cours du Symposium NDSS.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"275\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/NDSS-sponsor.jpg\" alt=\"People gathered around a poster board engaged in conversation.\" class=\"wp-image-207604\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/NDSS-sponsor.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/NDSS-sponsor-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/NDSS-sponsor-250x115.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.ndss-symposium.org\/sponsorship\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Devenir un sponsor <\/h5><\/div><p class=\"uagb-ifb-desc\">Montrez que votre organisation soutient les recherches \u00e9mergentes et la prochaine g\u00e9n\u00e9ration de leaders dans le domaine de la s\u00e9curit\u00e9 des syst\u00e8mes. En tant que sponsor, vous obtiendrez de la visibilit\u00e9 et de la reconnaissance chez les chercheurs et acteurs les plus r\u00e9put\u00e9s dans le domaine de la s\u00e9curit\u00e9. <\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Actualit\u00e9s<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a8fd20a7     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"1\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/odonoghue\/\" title=\"Articles par Karen O&#039;Donoghue\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Karen O&#039;Donoghue<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2021-02-22T22:07:22+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t22 f\u00e9vrier 2021\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/02\/les-meilleurs-et-les-plus-brillants-experts-en-matiere-de-securite-et-de-protection-de-la-vie-privee-se-reunissent-en-ligne-a-loccasion-du-ndss-2021\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Les meilleurs et les plus brillants experts en mati\u00e8re de s\u00e9curit\u00e9 et de protection de la vie priv\u00e9e se r\u00e9unissent en ligne \u00e0 l&rsquo;occasion du NDSS 2021<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/odonoghue\/\" title=\"Articles par Karen O&#039;Donoghue\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Karen O&#039;Donoghue<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2020-02-21T21:27:09+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t21 f\u00e9vrier 2020\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/02\/ndss-2020-le-meilleur-de-la-recherche-en-matiere-de-securite-pour-le-bien-de-linternet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">NDSS 2020 : Le meilleur de la recherche en mati\u00e8re de s\u00e9curit\u00e9 &#8211; pour le bien de l&rsquo;Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ford\/\" title=\"Articles par Mat Ford\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Mat Ford<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2018-02-20T21:40:48+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t20 f\u00e9vrier 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">NDSS 2018: Automatisation du processus de d\u00e9couverte de vuln\u00e9rabilit\u00e9s<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ford\/\" title=\"Articles par Mat Ford\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Mat Ford<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2018-02-20T13:33:05+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t20 f\u00e9vrier 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/report-distributed-iot-security-standards-workshop-ndss-2018\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Rapport: Atelier du Symposium NDSS sur la s\u00e9curit\u00e9 distribu\u00e9e IdO et sur les normes 2018<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/\" title=\"Articles par Olaf Kolkman\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Olaf Kolkman<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2018-02-18T14:00:09+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t18 f\u00e9vrier 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/starting-today-ndss-highlights-best-internet-security-research\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">\u00c0 partir d&rsquo;aujourd&rsquo;hui : le Symposium NDSS souligne le meilleur de la recherche sur la s\u00e9curit\u00e9 Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/fwang\/\" title=\"Articles par Fish Wang\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Fish Wang<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2018-02-14T20:02:32+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t14 f\u00e9vrier 2018\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Atelier sur la recherche analytique binaire (BAR) 2018 au NDSS le 18 f\u00e9vrier<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Droits d&rsquo;auteur: <br>\u00a9 Stonehouse Photographic, \u00a9 Wes Hardaker, \u00a9 Stonehouse Photographic, \u00a9 Wes Hardaker<\/p>\n","protected":false},"excerpt":{"rendered":"<p><b>\u00c9v\u00e9nement o\u00f9 des universitaires, des chercheurs, et des professionnels de premier plan, en mati\u00e8re de s\u00e9curit\u00e9, partagent les derni\u00e8res d\u00e9couvertes du secteur.<\/b><br \/>\nDepuis 1993, le Symposium NDSS est l\u2019une des premi\u00e8res conf\u00e9rences en mati\u00e8re de s\u00e9curit\u00e9 \u00e0 travers le monde, o\u00f9 les experts \u00e9changent leurs id\u00e9es et discutent de recherches de haut niveau \u00e9valu\u00e9es par des pairs. Explorez l\u2019archive des articles accept\u00e9s.<\/p>\n","protected":false},"author":1720,"featured_media":0,"parent":223219,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[118,4898,4909],"tags":[669,5939],"region_news_regions":[],"content_category":[],"ppma_author":[5657],"class_list":["post-165689","page","type-page","status-publish","hentry","category-qui-sommes-nous","category-strong-internet","category-renforcer-internet","tag-actionplan","tag-plan-daction"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Jelena Mirkovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00c9v\u00e9nement o\u00f9 des universitaires, des chercheurs, et des professionnels de premier plan, en mati\u00e8re de s\u00e9curit\u00e9, partagent les derni\u00e8res d\u00e9couvertes du secteur. Depuis 1993, le Symposium NDSS est l\u2019une des premi\u00e8res conf\u00e9rences en mati\u00e8re de s\u00e9curit\u00e9 \u00e0 travers le monde, o\u00f9 les experts \u00e9changent leurs id\u00e9es et discutent de recherches de haut niveau \u00e9valu\u00e9es par\u2026","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/165689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1720"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=165689"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/165689\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/223219"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=165689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=165689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=165689"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=165689"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=165689"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=165689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}