{"id":74070,"date":"2018-02-20T21:40:48","date_gmt":"2018-02-20T21:40:48","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/"},"modified":"2025-11-27T16:47:11","modified_gmt":"2025-11-27T16:47:11","slug":"ndss-2018-automating-process-vulnerability-discovery","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/","title":{"rendered":"NDSS 2018: Automatisation du processus de d\u00e9couverte de vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"<p><a href=\"https:\/\/www.ndss-symposium.org\/\">NDSS 2018<\/a> bat son plein \u00e0 San Diego cette semaine et des articles qui ont vraiment attir\u00e9 mon attention \u00e9taient hier tous deux dans la m\u00eame session sur la s\u00e9curit\u00e9 r\u00e9seau et les r\u00e9seaux cellulaires.(<a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/programme\/#02A\">Network Security and Cellular Networks<\/a>)<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/ndss-2018-automating-process-vulnerability-discovery\/\">Lire la suite en anglais<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NDSS 2018 bat son plein \u00e0 San Diego cette semaine et des articles qui ont vraiment attir\u00e9 mon attention \u00e9taient hier tous deux dans la m\u00eame session sur la s\u00e9curit\u00e9 r\u00e9seau et les r\u00e9seaux cellulaires.(Network Security and Cellular Networks) Lire la suite en anglais<\/p>\n","protected":false},"author":38,"featured_media":65483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,189,169,4909,4775,183],"tags":[6215,6316],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4103],"class_list":["post-74070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-evenements","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-technologie","tag-evenements","tag-symposium-sur-la-securite-des-reseaux-et-des-systemes-distribues-ndss","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Mat Ford","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/ford\/"},"uagb_comment_info":0,"uagb_excerpt":"NDSS 2018 bat son plein \u00e0 San Diego cette semaine et des articles qui ont vraiment attir\u00e9 mon attention \u00e9taient hier tous deux dans la m\u00eame session sur la s\u00e9curit\u00e9 r\u00e9seau et les r\u00e9seaux cellulaires.(Network Security and Cellular Networks) Lire la suite en anglais","authors":[{"term_id":4103,"user_id":38,"is_guest":0,"slug":"ford","display_name":"Mat Ford","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/74070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=74070"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/74070\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/65483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=74070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=74070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=74070"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=74070"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=74070"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=74070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}