{"id":73611,"date":"2018-02-14T20:02:32","date_gmt":"2018-02-14T20:02:32","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/"},"modified":"2025-11-27T16:46:49","modified_gmt":"2025-11-27T16:46:49","slug":"workshop-binary-analysis-research-bar-2018-ndss-18-february","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/","title":{"rendered":"Atelier sur la recherche analytique binaire (BAR) 2018 au NDSS le 18 f\u00e9vrier"},"content":{"rendered":"<p>L&rsquo;analyse binaire fait r\u00e9f\u00e9rence au processus par lequel les analystes humains par rapport aux les syst\u00e8mes automatis\u00e9s examinent le code sous-jacent dans un logiciel pour d\u00e9couvrir, exploiter et se d\u00e9fendre contre la malveillance et les vuln\u00e9rabilit\u00e9s, souvent sans acc\u00e8s au code source. Gr\u00e2ce \u00e0 la protection des logiciels h\u00e9rit\u00e9s d\u00e9ploy\u00e9s sur tous les types d&rsquo;appareils et de plates-formes dans le monde moderne, les techniques d&rsquo;analyse binaire sont de plus en plus essentielles pour s\u00e9curiser davantage notre vie quotidienne et notre soci\u00e9t\u00e9.<\/p>\n<p>Un Atelier sur la recherche en analyse binaire (<a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/bar-workshop-programme\/\">Workshop on Binary Analysis Research (BAR)<\/a>\u00a0sera co-localis\u00e9 avec le Symposium sur la s\u00e9curit\u00e9 du r\u00e9seau\u00a0et du syst\u00e8me distribu\u00e9 (NDSS)\u00a0<a href=\"https:\/\/www.ndss-symposium.org\/\">Network and Distributed System Security Symposium (NDSS)<\/a>,, qui se tiendra \u00e0 San Diego, CA, \u00c9tats-Unis, le 18 f\u00e9vrier 2018.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/workshop-binary-analysis-research-bar-2018-ndss-18-february\/\">Cliquez ici pour plus des d\u00e9tails<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;analyse binaire fait r\u00e9f\u00e9rence au processus par lequel les analystes humains par rapport aux les syst\u00e8mes automatis\u00e9s examinent le code sous-jacent dans un logiciel pour d\u00e9couvrir, exploiter et se d\u00e9fendre contre la malveillance et les vuln\u00e9rabilit\u00e9s, souvent sans acc\u00e8s au code source. Gr\u00e2ce \u00e0 la protection des logiciels h\u00e9rit\u00e9s d\u00e9ploy\u00e9s sur tous les types d&rsquo;appareils [&hellip;]<\/p>\n","protected":false},"author":1332,"featured_media":73612,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,185,189,4909,4775,183],"tags":[6215,6316],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4242],"class_list":["post-73611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confiance","category-evenements","category-renforcer-internet","category-securite-fr","category-technologie","tag-evenements","tag-symposium-sur-la-securite-des-reseaux-et-des-systemes-distribues-ndss","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",4000,2667,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",1536,1024,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",2048,1366,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/research.jpg",600,400,false]},"uagb_author_info":{"display_name":"Fish Wang","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/fwang\/"},"uagb_comment_info":0,"uagb_excerpt":"L&rsquo;analyse binaire fait r\u00e9f\u00e9rence au processus par lequel les analystes humains par rapport aux les syst\u00e8mes automatis\u00e9s examinent le code sous-jacent dans un logiciel pour d\u00e9couvrir, exploiter et se d\u00e9fendre contre la malveillance et les vuln\u00e9rabilit\u00e9s, souvent sans acc\u00e8s au code source. Gr\u00e2ce \u00e0 la protection des logiciels h\u00e9rit\u00e9s d\u00e9ploy\u00e9s sur tous les types d&rsquo;appareils\u2026","authors":[{"term_id":4242,"user_id":1332,"is_guest":0,"slug":"fwang","display_name":"Fish Wang","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/deec6fcfdaf45f7bac99ee20fd97c5502bb171d93879e458d18f12000f3d4a3f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/73611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=73611"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/73611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/73612"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=73611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=73611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=73611"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=73611"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=73611"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=73611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}