{"id":228054,"date":"2013-06-07T09:58:33","date_gmt":"2013-06-07T08:58:33","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=1065"},"modified":"2013-06-07T09:58:33","modified_gmt":"2013-06-07T08:58:33","slug":"sstic-2013-premiere-journee","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/sstic-2013-premiere-journee\/","title":{"rendered":"SSTIC 2013 \u2013 Day One"},"content":{"rendered":"<p>As every year, the famous Symposium on Information and Communication Technology Security (SSTIC) takes place in Rennes! Intrinsec attends these conferences and offers you a summary of each day.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00abInnovation in symmetric cryptography\u00bb \u2013 Joan Daemen (STMicroelectronics, Belgium)<\/span><\/strong><\/p>\n<p>SSTIC starts strong this year with Joan Daemen, Belgian cryptologist and co-designer of Rijndael, an algorithm that won the AES competition in October 2000.<\/p>\n<p>The conference begins with a review of symmetric cryptography since the 1990s, notably revisiting the DES encryption algorithm. It outlines the main expected properties of symmetric algorithms and the various constraints: non-linearity, maximum diffusion, and processing time.<\/p>\n<p>The second part of the conference focuses on Keccak, a hashing algorithm developed jointly with three other researchers. Keccak became SHA-3 in October 2012 following the NIST hash function competition.<\/p>\n<p>Joan concluded by insisting that it is often necessary to start from scratch and that one should never dismiss an idea without trying, even if many attempts prove unsatisfactory.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00abFlattening control flow graphs and symbolic execution\u00bb \u2013 Eloi Vanderbeken (OPPIDA)<\/span><\/strong><\/p>\n<p>After the break, the day continued with a &quot;con artist presentation,&quot; as the speaker himself put it. He took us on a journey through code obfuscation\u2014or rather, code unblocking\u2014to introduce us to the tool he was developing.<\/p>\n<p>He begins with some basic concepts about code obfuscation, high\/low level, then moves on to the different code obfuscation techniques with their advantages and disadvantages:<\/p>\n<ul>\n<li>Approach method with execution monitoring<\/li>\n<li>Data tracking approach method<\/li>\n<li>Static method, the method he chose<\/li>\n<\/ul>\n<p>The slides lack precision, he only has 30 minutes and he rattles off concepts at high speed: &quot;traces&quot;, &quot;basic blocks&quot;, &quot;execution graphs&quot;, &quot;managers&quot;, everything is covered.<\/p>\n<p>The presentation continued with a live demonstration of the tool. The demonstration didn&#039;t seem to convince the audience, and he eventually admitted that his tool didn&#039;t really work.<\/p>\n<p>The presentation ends with a series of rather lively questions and answers which brilliantly concludes the presentation.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00abBinary Polyglots and Implications\u00bb \u2013 Ange Albertini<\/span><\/strong><\/p>\n<p>Polyglot binaries are files that can incorporate multiple data formats: a PDF, a ZIP file, HTML, an executable, etc. Faced with increasingly complex malware, it is crucial to be able to correctly identify and analyze it. Indeed, one can imagine a binary recognized by antivirus software as a legitimate HTML page, but which is actually also a malicious executable.<\/p>\n<p>Contrary to popular belief, identifying a file&#039;s format is far from trivial, mainly due to incomplete format documentation and lax software. The conference illustrates significant differences in rendering between various PDF readers, a far cry from the misconception that this format renders in a single way.<\/p>\n<p>This issue appears to be addressed by several recent antivirus programs. For example, files detected as having multiple formats are considered malicious.<\/p>\n<p>The speaker concluded with several suggestions: strengthening controls at the operating system level (e.g., a downloaded file with a pdf extension should not be able to be executed later), implementing isolation for downloaded files, or defining a long signature per type to avoid confusion.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00abDynamic recompilation of hostile binary code\u00bb \u2013 S\u00e9bastien Josse (DGA)<\/span><\/strong><\/p>\n<p>After Ange&#039;s presentation, we move on to malware analysis. Here, the speaker focuses on code obfuscation. We begin with a current overview of malware analysis tools. Few tools exist, most lack automation, and few are cross-platform\u2026 The conclusion is clear: the current tooling is incomplete and inadequate.<\/p>\n<p>He then presents us with the tool he is developing, which allows for the analysis and deobfuscation of malware in any environment.<\/p>\n<p>Based around the Qemu engine and the LLVM compilation chain, a suite of modules enabling code extraction, reduction and normalization has been developed.<\/p>\n<p>The presentation ends with a somewhat slow demonstration video, which nevertheless has the merit of showing the different modules working and demonstrating the analysis of a pseudo-malware created for the occasion.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Short presentations<\/span><\/strong><\/p>\n<p>Right after eating, we attend two short 15-minute presentations.<\/p>\n<p>The first one, by Olivier Levillain (ANSSI), presents us with <strong>\u00abParsifal\u00bb, a robust parser made in OCaml.<\/strong><\/p>\n<p>After attempting Proofs of Concept (PoCs) in Python and C++, he realized that the OCaml language offered interesting features for developing robust and stable programs. He therefore hopes to use its parser to analyze several hundred gigabytes of SSL data collected from the internet.<\/p>\n<p>The simplicity of the code allows for the rapid development of fairly strict parsers. The introduction to this conference aptly reflects its conclusion: &quot;To understand a protocol, the best way is to implement it.&quot;.<\/p>\n<p>Later, we discover &quot;\u00ab<strong>\u00a0NFTables<\/strong>\u00a0\u00bb&quot;, presented by Eric Leblond. After some feedback on the major flaws of IPTables (lack of responsiveness when adding a rule, combinatorial explosion of rule management when multiplying IPs and ports\u2026).<\/p>\n<p>In 2008, Patrick McHardy developed and presented NFTables. Among the improvements were a new configuration grammar, the ability to access via NetLink-based code libraries, an atomic modification system to avoid having to reload all rules, and a notification system.<\/p>\n<p>This new implementation is based on BPF, and offers 3 operating modes:<\/p>\n<ul>\n<li>Configuration file mode<\/li>\n<li>Command line mode<\/li>\n<li>Code library mode<\/li>\n<\/ul>\n<p>We also find better set management allowing sets to be managed in a single rule, better clarity of the ruleset, and management of evolutions.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00ab&quot;Smart card terminal compromise&quot; \u2013 G Vinet<\/span><\/strong><\/p>\n<p>Smart cards are increasingly used in information systems today. Among the strengths of this technology are the ability to securely store information, and to use encryption or data signing.<\/p>\n<p>The data on the smart card is protected by a PIN code. Using this code on an infected workstation can lead to code theft.<\/p>\n<p>To protect against this type of scenario, there are external USB terminals that allow the data on the card to be protected even if the workstation is compromised.<\/p>\n<p>Studies have been conducted on some of these devices to assess their security level. To do this, a smart card emulator was developed using an Arduino platform to simulate malicious actions.<\/p>\n<p>Thus, it was possible to retrieve information from previous sessions, potentially the PIN code of a card\u2026<\/p>\n<p>However, these terminals are not protected against physical attacks such as magnetic radiation analysis, or connector trapping.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00abApplication attacks via modified USB devices\u00bb \u2013 Beno\u00eet Badrignans (Seclab FR)<\/span><\/strong><\/p>\n<p>At 3:45 PM, we&#039;re still focusing on hardware-based attacks. In this presentation, Beno\u00eet Badrignans shows us how, using modified USB devices, it&#039;s possible to take control of a workstation, bypassing many of the protection mechanisms that can be implemented within an information system.<\/p>\n<p>In the first slides, he shows us how a standard USB device works and what the known attack vectors are. These include attacks via the file system, autorun, and so on. Next, a comparison is presented between standard and modified devices. Thus, the same vectors (USB Stack, File System, devices) bring their own new set of exploits.<\/p>\n<p>We then move on to different existing systems. From DIY projects based on Arduino to commercial solutions, we discover peripherals that allow us to compromise an operating system in surprising ways.<\/p>\n<p>Subsequently, two fully functional scenarios are presented to us:<\/p>\n<ul>\n<li>Exfiltrating a file from a workstation mounting USB drives in read-only mode<\/li>\n<\/ul>\n<p>Using modified firmware, the USB device presents itself to the operating system as both storage and a keyboard\/mouse device. The operating system doesn&#039;t raise any suspicions about this device. With the help of a custom script running on the machine and a series of perfectly legitimate read requests, the firmware manages to reconstruct the file to be exfiltrated and thus write a document to its filesystem, even though it was mounted read-only. Quite impressive, both in terms of the method employed and the ingenuity of the exfiltration &quot;protocol.&quot;.<\/p>\n<ul>\n<li>Malware execution on a workstation after the key has passed through a decontamination airlock<\/li>\n<\/ul>\n<p>Among the measures taken to protect against USB drive attacks, some companies install decontamination SAS systems to analyze USB drives before they enter the information system, or even to format them. This system presents us with a device capable of identifying the system it is plugged into and mounting a different file system depending on certain conditions (for example, the number of times the drive has been connected). Once the &quot;malicious&quot; file system is presented, the device behaves like a keyboard\/mouse, simulating a user at their workstation, and attempts to launch the malware located on the drive.<\/p>\n<p>Some protective measures exist, including virtualization mechanisms like Qubes OS, which allow USB device actions to be isolated within specific virtual machines. These solutions are complex to implement and require specific user training.<\/p>\n<p>PCI cards also exist that allow the USB layer to be isolated from the OS in order to filter and analyze the behavior of peripherals.<\/p>\n<p>In conclusion, this type of device allows the attacker to virtually enter the victim&#039;s workstation and can potentially become very dangerous.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Reflections on Operation &quot;Red October&quot; \u2013 Nicolas Brulez (Kaspersky)<\/span><\/strong><\/p>\n<p>In October 2012, Kaspersky identified a large-scale cyber espionage network primarily targeting research, diplomatic and governmental organizations in various countries.<\/p>\n<p>The earliest traces of this campaign date back to May 2007 and continued until July 2012.<\/p>\n<p>The underlying architecture is conventional and uses a C&amp;C server protected by multiple proxy layers (at least two layers identified); over 60 domain names were registered for the operation. Various types of equipment were targeted: workstations, smartphones, enterprise equipment (Cisco), and removable drives.<\/p>\n<p>The infection was spread through phishing email campaigns containing malicious attachments. Unlike Stuxnet or Duqu, no zero-day exploits were used; the malicious attachments primarily relied on well-known, older Word or Excel vulnerabilities.<\/p>\n<p>Unfortunately, the conference did not bring any new facts or significant details.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">\u00ab&quot;Embedded systems: between trust and distrust&quot; \u2013 Aur\u00e9lien Francillon (Eurecom)<\/span><\/strong><\/p>\n<p>Embedded systems are everywhere today. A large proportion of the objects we handle daily contain them. These systems are generally small and simple, but relatively opaque and offer no security.<\/p>\n<p>Aur\u00e9lien Francillon presents, through several concrete examples, the work he conducts with his students at Eurecom. Among the most striking examples are rewriting a hard drive&#039;s firmware to integrate a backdoor, hijacking keyless entry systems to unlock and start vehicles, and attacks on aircraft positioning systems. The presentation, quite unlike others, is pleasantly enhanced with photos of hacks, anecdotes, and ideas to explore further.<\/p>\n<p>&nbsp;<\/p>\n<p>This first day ends with a friendly cocktail reception, an ideal time to meet other enthusiasts, exchange ideas and review the day&#039;s conferences.<\/p>\n<p><em>By Maxime le Metayer and Antoine David<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>As every year, the renowned Symposium on Information Technology Security and [\u2026]<\/p>","protected":false},"author":13,"featured_media":262,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[65],"class_list":["post-228054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-sstic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SSTIC 2013 - Premi\u00e8re journ\u00e9e - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/sstic-2013-premiere-journee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSTIC 2013 - Premi\u00e8re journ\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Comme chaque ann\u00e9e, le c\u00e9l\u00e8bre Symposium sur la S\u00e9curit\u00e9 des Technologies de l&rsquo;Information et des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/sstic-2013-premiere-journee\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-07T08:58:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1678\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"headline\":\"SSTIC 2013 &#8211; Premi\u00e8re journ\u00e9e\",\"datePublished\":\"2013-06-07T08:58:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/\"},\"wordCount\":2318,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"keywords\":[\"SSTIC\"],\"articleSection\":[\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/\",\"name\":\"SSTIC 2013 - Premi\u00e8re journ\u00e9e - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"datePublished\":\"2013-06-07T08:58:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"width\":1678,\"height\":344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2013-premiere-journee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SSTIC 2013 &#8211; Premi\u00e8re journ\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SSTIC 2013 - Premi\u00e8re journ\u00e9e - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/sstic-2013-premiere-journee\/","og_locale":"en_US","og_type":"article","og_title":"SSTIC 2013 - Premi\u00e8re journ\u00e9e","og_description":"Comme chaque ann\u00e9e, le c\u00e9l\u00e8bre Symposium sur la S\u00e9curit\u00e9 des Technologies de l&rsquo;Information et des [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/sstic-2013-premiere-journee\/","og_site_name":"INTRINSEC","article_published_time":"2013-06-07T08:58:33+00:00","og_image":[{"width":1678,"height":344,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/"},"author":{"name":"Admin","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"headline":"SSTIC 2013 &#8211; Premi\u00e8re journ\u00e9e","datePublished":"2013-06-07T08:58:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/"},"wordCount":2318,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","keywords":["SSTIC"],"articleSection":["Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/","url":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/","name":"SSTIC 2013 - Premi\u00e8re journ\u00e9e - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","datePublished":"2013-06-07T08:58:33+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","width":1678,"height":344},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/sstic-2013-premiere-journee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"SSTIC 2013 &#8211; Premi\u00e8re journ\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Admin"},"url":"https:\/\/www.intrinsec.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=228054"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/262"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=228054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=228054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=228054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}