
{"id":254475,"date":"2025-11-29T02:16:17","date_gmt":"2025-11-29T03:16:17","guid":{"rendered":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/"},"modified":"2025-12-22T10:02:46","modified_gmt":"2025-12-22T11:02:46","slug":"supercourse-0000010649","status":"publish","type":"product","link":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/","title":{"rendered":"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats"},"content":{"rendered":"<div style=\"background: linear-gradient(135deg, #667eea 0%, #764ba2 100%); padding: 30px; border-radius: 15px; color: white; margin-bottom: 30px;\">\n<h2 style=\"color: white; text-align: center; margin-bottom: 20px;\">\ud83c\udf93 \u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc \u062c\u0627\u0645\u0639<\/h2>\n<\/p><\/div>\n<div style=\"margin-bottom: 30px;\">\n<h3 style=\"color: #333; margin-bottom: 15px;\">\ud83d\udcda \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0648\u0631\u0647<\/h3>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0639\u0646\u0648\u0627\u0646 \u062f\u0648\u0631\u0647:<\/strong> Rust and Security Research: Investigating Emerging Security Threats<\/p>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0645\u0648\u0636\u0648\u0639 \u06a9\u0644\u06cc:<\/strong> \u0628\u0631\u0646\u0627\u0645\u0647 \u0646\u0648\u06cc\u0633\u06cc<\/p>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0645\u0648\u0636\u0648\u0639 \u0645\u06cc\u0627\u0646\u06cc:<\/strong> \u0631\u0627\u0633\u062a (Rust)<\/p>\n<\/div>\n<div style=\"margin-bottom: 30px;\">\n<h3 style=\"color: #333; margin-bottom: 15px;\">\ud83d\udccb \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647 (100 \u0645\u0648\u0636\u0648\u0639)<\/h3>\n<ul style=\"list-style-type: none; padding: 0;\">\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">1.<\/span> Introduction to Rust for Security Research\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">2.<\/span> Setting Up Your Rust Development Environment\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">3.<\/span> Rust&#039;s Core Principles: Ownership, Borrowing, Lifetimes\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">4.<\/span> Basic Syntax, Variables, and Data Types\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">5.<\/span> Control Flow: Conditionals and Loops\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">6.<\/span> Functions, Modules, and Crates\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">7.<\/span> Structs, Enums, and Pattern Matching\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">8.<\/span> Error Handling with Result and Option\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">9.<\/span> Collections: Vec, HashMap, String\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">10.<\/span> Traits and Generics for Reusable Code\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">11.<\/span> Closures and Iterators\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">12.<\/span> Smart Pointers (Box, Rc, Arc)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">13.<\/span> Concurrency in Rust: Threads and Message Passing\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">14.<\/span> Asynchronous Programming with Async\/Await\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">15.<\/span> Macros: Declarative and Procedural\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">16.<\/span> The Rust Build System: Cargo Advanced Features\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">17.<\/span> Testing and Benchmarking Rust Code\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">18.<\/span> Documentation and Code Quality in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">19.<\/span> Performance Optimization Basics for Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">20.<\/span> `Unsafe` Rust: Understanding its Scope and Risks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">21.<\/span> Raw Pointers and `Unsafe` Blocks in Detail\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">22.<\/span> Foreign Function Interface (FFI) with C\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">23.<\/span> Interfacing with C++ Libraries (cxx crate)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">24.<\/span> Memory Layout and Data Representation\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">25.<\/span> Stack vs. Heap Allocation in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">26.<\/span> Operating System Primitives and Rust (syscalls)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">27.<\/span> File System Interaction and Permissions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">28.<\/span> Process Management and Inter-Process Communication\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">29.<\/span> Networking Basics: Sockets and Protocols in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">30.<\/span> Embedded Rust for Bare-Metal Development\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">31.<\/span> Introduction to Assembly Language (x86-64)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">32.<\/span> Debugging Rust Binaries (GDB, LLDB)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">33.<\/span> Understanding Linkers and Loaders\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">34.<\/span> ELF\/PE File Format Analysis Basics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">35.<\/span> System Call Tracing (strace\/dtrace equivalents)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">36.<\/span> Introduction to Cyber Security Research Methodologies\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">37.<\/span> Threat Modeling and Risk Assessment\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">38.<\/span> Common Vulnerability Classes (CWE, OWASP Top 10)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">39.<\/span> The MITRE ATT&amp;CK Framework\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">40.<\/span> Incident Response and Forensics Overview\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">41.<\/span> Ethical Hacking and Responsible Disclosure\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">42.<\/span> Setting Up a Secure Research Lab Environment\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">43.<\/span> Version Control and Secure Development Practices\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">44.<\/span> Introduction to Cryptography Fundamentals\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">45.<\/span> Secure Random Number Generation\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">46.<\/span> Rust&#039;s Memory Safety Guarantees vs. C\/C++\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">47.<\/span> Understanding Buffer Overflows (Stack and Heap)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">48.<\/span> Integer Overflows and Underflows\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">49.<\/span> Use-After-Free Vulnerabilities\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">50.<\/span> Double-Free and Other Heap Corruption Issues\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">51.<\/span> Race Conditions and Concurrency Bugs\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">52.<\/span> Format String Vulnerabilities\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">53.<\/span> Return-Oriented Programming (ROP) Fundamentals\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">54.<\/span> Practical ROP Chain Construction\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">55.<\/span> Heap Exploitation Techniques\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">56.<\/span> Kernel Exploitation Concepts\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">57.<\/span> Memory Protection Mechanisms (ASLR, DEP\/NX, Canaries)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">58.<\/span> Bypassing Modern Exploitation Mitigations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">59.<\/span> Secure Coding Practices in Rust to Prevent Exploits\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">60.<\/span> Writing Safe Unsafe Rust Code\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">61.<\/span> Raw Socket Programming and Packet Manipulation in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">62.<\/span> Building Network Scanners and Probes with Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">63.<\/span> Implementing Network Proxies and Interceptors\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">64.<\/span> Packet Capture and Analysis (pcap\/nix crates)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">65.<\/span> DNS Security and Rust Implementations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">66.<\/span> Introduction to Web Application Security\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">67.<\/span> Building Secure REST APIs with Rust Web Frameworks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">68.<\/span> Common Web Vulnerabilities and Rust Countermeasures (XSS, SQLi, CSRF)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">69.<\/span> Authentication and Authorization in Rust Web Apps\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">70.<\/span> TLS\/SSL Configuration and Best Practices in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">71.<\/span> Symmetric Key Cryptography in Rust (AES, ChaCha20)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">72.<\/span> Asymmetric Key Cryptography in Rust (RSA, ECC)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">73.<\/span> Hashing Algorithms and Digital Signatures\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">74.<\/span> Key Exchange Protocols (Diffie-Hellman, ECDH)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">75.<\/span> Public Key Infrastructure (PKI) and Certificates\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">76.<\/span> Quantum-Resistant Cryptography Basics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">77.<\/span> Implementing Secure Protocols in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">78.<\/span> Cryptographic API Misuse and Common Pitfalls\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">79.<\/span> Introduction to Fuzzing for Vulnerability Discovery\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">80.<\/span> Coverage-Guided Fuzzing with LibAFL and Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">81.<\/span> Writing Custom Fuzz Targets in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">82.<\/span> Developing AFL-like Fuzzers in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">83.<\/span> Static Analysis Tools for Rust (Clippy, Miri, custom linters)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">84.<\/span> Dynamic Analysis and Instrumentation Frameworks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">85.<\/span> Symbolic Execution and Concolic Testing Basics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">86.<\/span> Reverse Engineering Rust Binaries\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">87.<\/span> Disassemblers and Decompilers for Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">88.<\/span> Automated Vulnerability Scanning and SAST\/DAST for Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">89.<\/span> Developing Custom Security Tools and Utilities in Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">90.<\/span> Malware Analysis Fundamentals and Rust&#039;s Role\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">91.<\/span> Supply Chain Security for Rust Projects (crates.io, dependency auditing)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">92.<\/span> Software Bill of Materials (SBOM) Generation for Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">93.<\/span> IoT Security Challenges and Rust Solutions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">94.<\/span> Firmware Analysis and Exploitation with Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">95.<\/span> Blockchain and Smart Contract Security with Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">96.<\/span> AI\/ML Security: Attacks on Models and Defenses\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">97.<\/span> Hardware-Assisted Security and TrustZone Integrations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">98.<\/span> Secure Enclaves and Confidential Computing with Rust\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">99.<\/span> DevSecOps Principles and CI\/CD for Rust Projects\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">100.<\/span> The Future of Rust in Cybersecurity and Emerging Research Areas\n                    <\/li>\n<\/ul>\n<\/div>\n<div style=\"margin-bottom: 30px;\"><!DOCTYPE html><br \/>\n<html lang=\"fa\" dir=\"rtl\"><br \/>\n<head><br \/>\n    <meta charset=\"UTF-8\"><br \/>\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\"><br \/>\n    <title>\u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc Rust and Security Research: Investigating Emerging Security Threats<\/title><br \/>\n<\/head><br \/>\n<body><\/p>\n<h1>\u062f\u0648\u0631\u0647 \u062c\u0627\u0645\u0639 Rust and Security Research: \u06a9\u0634\u0641 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u0648\u0638\u0647\u0648\u0631<\/h1>\n<h2>\u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647: \u0628\u0647 \u062e\u0637 \u0645\u0642\u062f\u0645 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0627 Rust \u0628\u067e\u06cc\u0648\u0646\u062f\u06cc\u062f<\/h2>\n<p>\n        \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0647 \u0633\u0631\u0639\u062a \u062f\u0631 \u062d\u0627\u0644 \u062a\u063a\u06cc\u06cc\u0631 \u0627\u0633\u062a. \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u067e\u06cc\u0686\u06cc\u062f\u0647\u200c\u062a\u0631 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u0648 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0642\u062f\u06cc\u0645\u06cc \u062f\u06cc\u06af\u0631 \u06a9\u0627\u0641\u06cc \u0646\u06cc\u0633\u062a\u0646\u062f. \u062f\u0631 \u0627\u06cc\u0646 \u0645\u06cc\u0627\u0646\u060c \u0632\u0628\u0627\u0646 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc Rust \u0628\u0627 \u062a\u0645\u0631\u06a9\u0632 \u0628\u06cc\u200c\u0646\u0638\u06cc\u0631 \u0628\u0631 \u0627\u06cc\u0645\u0646\u06cc \u062d\u0627\u0641\u0638\u0647 (Memory Safety) \u0648 \u0639\u0645\u0644\u06a9\u0631\u062f \u0628\u0627\u0644\u0627\u060c \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u062a\u063a\u06cc\u06cc\u0631\u062f\u0647\u0646\u062f\u0647 \u0628\u0627\u0632\u06cc (Game Changer) \u062f\u0631 \u062d\u0627\u0644 \u0638\u0647\u0648\u0631 \u0627\u0633\u062a. Rust \u0628\u0647 \u0645\u062a\u062e\u0635\u0635\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0627\u06cc\u0646 \u0642\u062f\u0631\u062a \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc\u06cc \u0628\u0633\u0627\u0632\u0646\u062f \u06a9\u0647 \u0646\u0647 \u062a\u0646\u0647\u0627 \u0633\u0631\u06cc\u0639 \u0648 \u06a9\u0627\u0631\u0622\u0645\u062f \u0647\u0633\u062a\u0646\u062f\u060c \u0628\u0644\u06a9\u0647 \u0628\u0647 \u0637\u0648\u0631 \u067e\u06cc\u0634\u200c\u0641\u0631\u0636 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062f\u0633\u062a\u0647\u200c\u0627\u06cc \u06a9\u0627\u0645\u0644 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u062d\u0627\u0641\u0638\u0647\u060c \u0645\u0627\u0646\u0646\u062f Buffer Overflow \u0648 Use-After-Free\u060c \u0645\u0642\u0627\u0648\u0645\u200c\u0627\u0646\u062f. \u0627\u06cc\u0646 \u0648\u06cc\u0698\u06af\u06cc\u200c\u0647\u0627\u060c Rust \u0631\u0627 \u0628\u0647 \u0627\u0646\u062a\u062e\u0627\u0628 \u0627\u0648\u0644 \u0628\u0631\u0627\u06cc \u0633\u0627\u062e\u062a \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646 \u062f\u0631 \u0633\u0637\u062d \u0633\u06cc\u0633\u062a\u0645\u060c \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644\u200c\u0647\u0627 \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u0645\u0631\u0648\u0631\u06af\u0631\u0647\u0627\u06cc \u0648\u0628\u060c \u062a\u0628\u062f\u06cc\u0644 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n    <\/p>\n<p>\n        \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0641\u0642\u0637 \u06cc\u06a9 \u06a9\u0644\u0627\u0633 \u0622\u0645\u0648\u0632\u0634 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc Rust \u0646\u06cc\u0633\u062a\u061b \u0628\u0644\u06a9\u0647 \u06cc\u06a9 \u0633\u0641\u0631 \u0639\u0645\u06cc\u0642 \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u062a\u062d\u0642\u06cc\u0642 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0642\u062f\u0631\u062a\u0645\u0646\u062f\u062a\u0631\u06cc\u0646 \u0627\u0628\u0632\u0627\u0631 \u0645\u0648\u062c\u0648\u062f \u0627\u0633\u062a. \u0645\u0627 \u0628\u0647 \u0634\u0645\u0627 \u0646\u0634\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u06cc\u0645 \u0686\u06af\u0648\u0646\u0647 \u0627\u0632 \u0648\u06cc\u0698\u06af\u06cc\u200c\u0647\u0627\u06cc \u0645\u0646\u062d\u0635\u0631\u0628\u0647\u200c\u0641\u0631\u062f Rust \u0628\u0631\u0627\u06cc \u06a9\u0634\u0641\u060c \u062a\u062d\u0644\u06cc\u0644 \u0648 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u062f\u0631 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u062f\u0646\u06cc\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f. \u062f\u0631 \u0627\u06cc\u0646 \u0645\u0633\u06cc\u0631\u060c \u0634\u0645\u0627 \u06cc\u0627\u062f \u0645\u06cc\u200c\u06af\u06cc\u0631\u06cc\u062f \u06a9\u0647 \u0686\u06af\u0648\u0646\u0647 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0648\u062f \u0631\u0627 \u0627\u0632 \u0635\u0641\u0631 \u0628\u0633\u0627\u0632\u06cc\u062f\u060c \u0628\u0627\u06cc\u0646\u0631\u06cc\u200c\u0647\u0627 \u0631\u0627 \u0645\u0647\u0646\u062f\u0633\u06cc \u0645\u0639\u06a9\u0648\u0633 \u06a9\u0646\u06cc\u062f\u060c \u0628\u0627 \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0641\u0627\u0632\u06cc\u0646\u06af \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc 0-Day \u067e\u06cc\u062f\u0627 \u06a9\u0646\u06cc\u062f \u0648 \u062d\u062a\u06cc \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a\u200c\u0647\u0627\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647 \u0631\u0627 \u062a\u0648\u0633\u0639\u0647 \u062f\u0647\u06cc\u062f.\n    <\/p>\n<p>\n        \u0627\u06af\u0631 \u0622\u0645\u0627\u062f\u0647\u200c\u0627\u06cc\u062f \u062a\u0627 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0633\u0637\u062d \u0628\u0639\u062f\u06cc \u0627\u0631\u062a\u0642\u0627 \u062f\u0647\u06cc\u062f\u060c \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0645\u0627\u062f\u0647 \u0641\u0631\u0627\u062a\u0631 \u0628\u0631\u0648\u06cc\u062f \u0648 \u0628\u0647 \u062e\u0637 \u0645\u0642\u062f\u0645 \u0645\u0628\u0627\u0631\u0632\u0647 \u0628\u0627 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0646\u0648\u0638\u0647\u0648\u0631 \u0628\u067e\u06cc\u0648\u0646\u062f\u06cc\u062f\u060c \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0631\u0627\u06cc \u0634\u0645\u0627 \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a. \u0645\u0627 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u062d\u0631\u0641\u0647\u200c\u0627\u06cc \u062a\u0628\u062f\u06cc\u0644 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645 \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0627 \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 \u0648 \u0642\u062f\u0631\u062a\u060c \u067e\u06cc\u0686\u06cc\u062f\u0647\u200c\u062a\u0631\u06cc\u0646 \u0686\u0627\u0644\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0631\u0627 \u062d\u0644 \u06a9\u0646\u062f.\n    <\/p>\n<h2>\u062f\u0631\u0628\u0627\u0631\u0647 \u062f\u0648\u0631\u0647: \u06cc\u06a9 \u0646\u0642\u0634\u0647 \u0631\u0627\u0647 \u0639\u0645\u0644\u06cc \u0628\u0631\u0627\u06cc \u062a\u0633\u0644\u0637<\/h2>\n<p>\n        \u062f\u0648\u0631\u0647 &#8220;Rust and Security Research&#8221; \u06cc\u06a9 \u0646\u0642\u0634\u0647 \u0631\u0627\u0647 \u06a9\u0627\u0645\u0644 \u0628\u0631\u0627\u06cc \u062a\u0628\u062f\u06cc\u0644 \u0634\u062f\u0646 \u0628\u0647 \u06cc\u06a9 \u0645\u062d\u0642\u0642 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0633\u0644\u0637 \u0628\u0631 Rust \u0627\u0633\u062a. \u0645\u0627 \u0627\u0632 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647\u200c\u0627\u06cc Rust \u06a9\u0647 \u0628\u0631\u0627\u06cc \u0647\u0631 \u0645\u062a\u062e\u0635\u0635 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0636\u0631\u0648\u0631\u06cc \u0627\u0633\u062a\u060c \u0645\u0627\u0646\u0646\u062f \u0645\u0627\u0644\u06a9\u06cc\u062a (Ownership) \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062d\u0627\u0641\u0638\u0647 \u0627\u0645\u0646\u060c \u0634\u0631\u0648\u0639 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645 \u0648 \u0628\u0647 \u0633\u0631\u0639\u062a \u0628\u0647 \u0633\u0645\u062a \u0645\u0648\u0636\u0648\u0639\u0627\u062a \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0645\u0627\u0646\u0646\u062f \u0645\u0647\u0646\u062f\u0633\u06cc \u0645\u0639\u06a9\u0648\u0633\u060c \u0641\u0627\u0632\u06cc\u0646\u06af\u060c \u062a\u0648\u0633\u0639\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u062d\u0631\u06a9\u062a \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645. \u0647\u0631 \u0628\u062e\u0634 \u0627\u0632 \u062f\u0648\u0631\u0647 \u0628\u0627 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627 \u0648 \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0647\u0645\u0631\u0627\u0647 \u0627\u0633\u062a \u062a\u0627 \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 \u062d\u0627\u0635\u0644 \u0634\u0648\u062f \u06a9\u0647 \u0634\u0645\u0627 \u0646\u0647 \u062a\u0646\u0647\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0631\u0627 \u062f\u0631\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u062f\u060c \u0628\u0644\u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0622\u0646\u200c\u0647\u0627 \u0631\u0627 \u062f\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0648 \u0686\u0627\u0644\u0634\u200c\u0628\u0631\u0627\u0646\u06af\u06cc\u0632 \u0628\u0647 \u06a9\u0627\u0631 \u0628\u06af\u06cc\u0631\u06cc\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u062a\u0626\u0648\u0631\u06cc \u0648 \u0639\u0645\u0644 \u0631\u0627 \u062a\u0631\u06a9\u06cc\u0628 \u0645\u06cc\u200c\u06a9\u0646\u062f \u062a\u0627 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0648\u0631\u0648\u062f \u0628\u0647 \u0628\u0627\u0632\u0627\u0631 \u06a9\u0627\u0631 \u062d\u0631\u0641\u0647\u200c\u0627\u06cc \u0622\u0645\u0627\u062f\u0647 \u0633\u0627\u0632\u062f.\n    <\/p>\n<h2>\u0645\u0648\u0636\u0648\u0639\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<ul>\n<li>\u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0628\u0627 Rust \u0628\u0627 \u0631\u0648\u06cc\u06a9\u0631\u062f \u0627\u0645\u0646\u06cc\u062a\u06cc<\/li>\n<li>\u0645\u062f\u06cc\u0631\u06cc\u062a \u062d\u0627\u0641\u0638\u0647 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0648 \u06a9\u0627\u0631 \u0628\u0627 \u06a9\u062f\u0647\u0627\u06cc <code>unsafe<\/code> \u0628\u0647 \u0635\u0648\u0631\u062a \u0627\u0645\u0646<\/li>\n<li>\u0645\u0647\u0646\u062f\u0633\u06cc \u0645\u0639\u06a9\u0648\u0633 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0628\u0627\u06cc\u0646\u0631\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc\u06cc (ELF, PE)<\/li>\n<li>\u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0641\u0627\u0632\u06cc\u0646\u06af (Fuzzing) \u0628\u0631\u0627\u06cc \u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc 0-Day<\/li>\n<li>\u062a\u0648\u0633\u0639\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0631\u0627\u06cc\u062c \u062d\u0627\u0641\u0638\u0647<\/li>\n<li>\u0633\u0627\u062e\u062a \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u0641\u0627\u0631\u0634\u06cc (\u0627\u0633\u06a9\u0646\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u06af\u0631\u060c \u0641\u0627\u0632\u0631 \u0648&#8230;)<\/li>\n<li>\u062a\u062d\u0644\u06cc\u0644 \u0627\u0633\u062a\u0627\u062a\u06cc\u06a9 \u0648 \u062f\u06cc\u0646\u0627\u0645\u06cc\u06a9 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627 \u0628\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 Rust<\/li>\n<li>\u0627\u0645\u0646\u06cc\u062a \u062f\u0631 WebAssembly (WASM) \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0647\u0645\u0632\u0645\u0627\u0646 (Concurrent)<\/li>\n<\/ul>\n<h2>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0631\u0627\u06cc \u0686\u0647 \u06a9\u0633\u0627\u0646\u06cc \u0645\u0646\u0627\u0633\u0628 \u0627\u0633\u062a\u061f<\/h2>\n<ul>\n<li><b>\u0645\u062d\u0642\u0642\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0634\u06a9\u0627\u0631\u0686\u06cc\u0627\u0646 \u0628\u0627\u06af (Bug Hunters)<\/b> \u06a9\u0647 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0642\u062f\u0631\u062a\u0645\u0646\u062f\u062a\u0631 \u0648 \u06a9\u0627\u0631\u0622\u0645\u062f\u062a\u0631 \u0647\u0633\u062a\u0646\u062f.<\/li>\n<li><b>\u062a\u0648\u0633\u0639\u0647\u200c\u062f\u0647\u0646\u062f\u06af\u0627\u0646 C\/C++<\/b> \u06a9\u0647 \u0645\u06cc\u200c\u062e\u0648\u0627\u0647\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0632\u0628\u0627\u0646 \u0627\u0645\u0646\u200c\u062a\u0631 \u0648 \u0645\u062f\u0631\u0646\u200c\u062a\u0631 \u0645\u0647\u0627\u062c\u0631\u062a \u06a9\u0646\u0646\u062f.<\/li>\n<li><b>\u0645\u062a\u062e\u0635\u0635\u0627\u0646 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 (Pentesters)<\/b> \u06a9\u0647 \u0642\u0635\u062f \u062f\u0627\u0631\u0646\u062f \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u062e\u062a\u0635\u0627\u0635\u06cc \u0648 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u062e\u0648\u062f \u0631\u0627 \u0628\u0633\u0627\u0632\u0646\u062f.<\/li>\n<li><b>\u062a\u062d\u0644\u06cc\u0644\u200c\u06af\u0631\u0627\u0646 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 (Malware Analysts)<\/b> \u06a9\u0647 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0631\u0648\u06cc\u06a9\u0631\u062f\u0647\u0627\u06cc \u0646\u0648\u06cc\u0646 \u062f\u0631 \u0645\u0647\u0646\u062f\u0633\u06cc \u0645\u0639\u06a9\u0648\u0633 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0647\u0633\u062a\u0646\u062f.<\/li>\n<li><b>\u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631<\/b> \u0639\u0644\u0627\u0642\u0647\u200c\u0645\u0646\u062f \u0628\u0647 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0637\u062d \u067e\u0627\u06cc\u06cc\u0646 (Low-Level Security).<\/li>\n<li><b>\u062f\u0627\u0646\u0634\u062c\u0648\u06cc\u0627\u0646 \u0648 \u0641\u0627\u0631\u063a\u200c\u0627\u0644\u062a\u062d\u0635\u06cc\u0644\u0627\u0646<\/b> \u0631\u0634\u062a\u0647\u200c\u0647\u0627\u06cc \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631 \u0648 \u0627\u0645\u0646\u06cc\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062e\u0648\u0627\u0647\u0646\u062f \u0645\u0647\u0627\u0631\u062a\u06cc \u0645\u062a\u0645\u0627\u06cc\u0632 \u0648 \u067e\u0631\u062a\u0642\u0627\u0636\u0627 \u06a9\u0633\u0628 \u06a9\u0646\u0646\u062f.<\/li>\n<\/ul>\n<h2>\u0686\u0631\u0627 \u0628\u0627\u06cc\u062f \u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0634\u0631\u06a9\u062a \u06a9\u0646\u06cc\u062f\u061f<\/h2>\n<h3>\u067e\u06cc\u0634\u0631\u0648 \u062f\u0631 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u0628\u0627\u0634\u06cc\u062f<\/h3>\n<p>Rust \u0622\u06cc\u0646\u062f\u0647 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc \u0627\u0645\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0627\u0633\u062a. \u0628\u0627 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0622\u0646\u060c \u062e\u0648\u062f \u0631\u0627 \u062f\u0631 \u0644\u0628\u0647 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u06cc\u062f \u0648 \u0627\u0632 \u0631\u0642\u0628\u0627 \u0645\u062a\u0645\u0627\u06cc\u0632 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f. \u0634\u0631\u06a9\u062a\u200c\u0647\u0627\u06cc \u0628\u0632\u0631\u06af \u0641\u0646\u0627\u0648\u0631\u06cc \u0645\u0627\u0646\u0646\u062f \u06af\u0648\u06af\u0644\u060c \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0648 \u0622\u0645\u0627\u0632\u0648\u0646 \u0628\u0647 \u0634\u062f\u062a \u062f\u0631 \u062d\u0627\u0644 \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u06af\u0630\u0627\u0631\u06cc \u0631\u0648\u06cc Rust \u0628\u0631\u0627\u06cc \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0648\u062f \u0647\u0633\u062a\u0646\u062f.<\/p>\n<h3>\u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0642\u062f\u0631\u062a\u0645\u0646\u062f \u062e\u0648\u062f\u062a\u0627\u0646 \u0631\u0627 \u0628\u0633\u0627\u0632\u06cc\u062f<\/h3>\n<p>\u0648\u0627\u0628\u0633\u062a\u06af\u06cc \u0628\u0647 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u062f\u06cc\u06af\u0631\u0627\u0646 \u0631\u0627 \u06a9\u0646\u0627\u0631 \u0628\u06af\u0630\u0627\u0631\u06cc\u062f. \u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u06cc\u0627\u062f \u0645\u06cc\u200c\u06af\u06cc\u0631\u06cc\u062f \u0686\u06af\u0648\u0646\u0647 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u0641\u0627\u0631\u0634\u06cc\u060c \u0633\u0631\u06cc\u0639 \u0648 \u0627\u06cc\u0645\u0646 \u0628\u0633\u0627\u0632\u06cc\u062f \u06a9\u0647 \u062f\u0642\u06cc\u0642\u0627\u064b \u0645\u0637\u0627\u0628\u0642 \u0646\u06cc\u0627\u0632 \u0634\u0645\u0627 \u0639\u0645\u0644 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u061b \u0627\u0632 \u06cc\u06a9 \u0641\u0627\u0632\u0631 \u0647\u0648\u0634\u0645\u0646\u062f \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u06cc\u06a9 \u062a\u062d\u0644\u06cc\u0644\u06af\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647.<\/p>\n<h3>\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0631\u0627 \u0639\u0645\u06cc\u0642\u0627\u064b \u062f\u0631\u06a9 \u06a9\u0646\u06cc\u062f<\/h3>\n<p>\u0641\u0631\u0627\u062a\u0631 \u0627\u0632 \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u0628\u0627 \u067e\u0627\u06cc\u062a\u0648\u0646 \u0628\u0631\u0648\u06cc\u062f. \u0628\u0627 Rust\u060c \u0634\u0645\u0627 \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647\u200c\u0627\u06cc \u062d\u0627\u0641\u0638\u0647 \u0633\u0631 \u0648 \u06a9\u0627\u0631 \u062f\u0627\u0631\u06cc\u062f \u0648 \u062f\u0642\u06cc\u0642\u0627\u064b \u062f\u0631\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u062f \u06a9\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0686\u06af\u0648\u0646\u0647 \u062f\u0631 \u0633\u0637\u062d \u0628\u0627\u06cc\u0646\u0631\u06cc \u0631\u062e \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u0648 \u0686\u06af\u0648\u0646\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u06cc\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u06a9\u0631\u062f.<\/p>\n<h3>\u0645\u0633\u06cc\u0631 \u0634\u063a\u0644\u06cc \u062e\u0648\u062f \u0631\u0627 \u0645\u062a\u062d\u0648\u0644 \u06a9\u0646\u06cc\u062f<\/h3>\n<p>\u062a\u0642\u0627\u0636\u0627 \u0628\u0631\u0627\u06cc \u0645\u062a\u062e\u0635\u0635\u0627\u0646\u06cc \u06a9\u0647 \u0647\u0645 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0647\u0645 \u0628\u0647 Rust \u0645\u0633\u0644\u0637 \u0647\u0633\u062a\u0646\u062f\u060c \u0628\u0647 \u0634\u062f\u062a \u062f\u0631 \u062d\u0627\u0644 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u06cc\u06a9 \u0645\u0632\u06cc\u062a \u0631\u0642\u0627\u0628\u062a\u06cc \u0641\u0648\u0642\u200c\u0627\u0644\u0639\u0627\u062f\u0647 \u0628\u0631\u0627\u06cc \u0634\u0645\u0627 \u0627\u06cc\u062c\u0627\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f \u0648 \u062f\u0631\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f\u06cc \u0627\u0632 \u0641\u0631\u0635\u062a\u200c\u0647\u0627\u06cc \u0634\u063a\u0644\u06cc \u0628\u0627 \u062f\u0631\u0622\u0645\u062f \u0628\u0627\u0644\u0627 \u0631\u0627 \u0628\u0647 \u0631\u0648\u06cc \u0634\u0645\u0627 \u0628\u0627\u0632 \u0645\u06cc\u200c\u06a9\u0646\u062f.<\/p>\n<h3>\u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u06f1\u06f0\u06f0\u066a \u0639\u0645\u0644\u06cc \u0648 \u067e\u0631\u0648\u0698\u0647-\u0645\u062d\u0648\u0631<\/h3>\n<p>\u0645\u0627 \u0628\u0647 \u0634\u0645\u0627 \u062a\u0626\u0648\u0631\u06cc \u062e\u0634\u06a9 \u06cc\u0627\u062f \u0646\u0645\u06cc\u200c\u062f\u0647\u06cc\u0645. \u0634\u0645\u0627 \u0628\u0627 \u062a\u062d\u0644\u06cc\u0644 \u06a9\u062f\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc\u060c \u0646\u0648\u0634\u062a\u0646 \u0641\u0627\u0632\u0631\u060c \u062a\u0648\u0633\u0639\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0648 \u0633\u0627\u062e\u062a \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc\u060c \u0645\u0641\u0627\u0647\u06cc\u0645 \u0631\u0627 \u0628\u0647 \u0635\u0648\u0631\u062a \u0639\u0645\u0644\u06cc \u0641\u0631\u0627 \u0645\u06cc\u200c\u06af\u06cc\u0631\u06cc\u062f. \u0647\u0631 \u0641\u0635\u0644 \u0628\u0627 \u06cc\u06a9 \u06cc\u0627 \u0686\u0646\u062f \u067e\u0631\u0648\u0698\u0647 \u0639\u0645\u0644\u06cc \u0628\u0647 \u067e\u0627\u06cc\u0627\u0646 \u0645\u06cc\u200c\u0631\u0633\u062f.<\/p>\n<h2>\u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062c\u0627\u0645\u0639 \u062f\u0648\u0631\u0647 (\u0628\u06cc\u0634 \u0627\u0632 \u06f1\u06f0\u06f0 \u062f\u0631\u0633 \u062a\u062e\u0635\u0635\u06cc)<\/h2>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0634\u0627\u0645\u0644 \u06f1\u06f0\u06f0 \u0633\u0631\u0641\u0635\u0644 \u062c\u0627\u0645\u0639 \u0627\u0633\u062a \u06a9\u0647 \u0634\u0645\u0627 \u0631\u0627 \u0627\u0632 \u06cc\u06a9 \u0645\u0628\u062a\u062f\u06cc \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u062a\u0645\u0627\u0645\u200c\u0639\u06cc\u0627\u0631 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u062a\u062d\u0642\u06cc\u0642 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627 Rust \u062a\u0628\u062f\u06cc\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u062f\u0631 \u0627\u062f\u0627\u0645\u0647 \u0646\u06af\u0627\u0647\u06cc \u0628\u0647 \u0633\u0627\u062e\u062a\u0627\u0631 \u06a9\u0644\u06cc \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627 \u0645\u06cc\u200c\u0627\u0646\u062f\u0627\u0632\u06cc\u0645:<\/p>\n<h3>\u0641\u0635\u0644 \u0627\u0648\u0644: \u0645\u0642\u062f\u0645\u0647 \u0648 \u0622\u0645\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0645\u062d\u06cc\u0637 (\u06f1\u06f0 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f1. \u0686\u0631\u0627 Rust \u0628\u0631\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u061f \u0645\u0642\u0627\u06cc\u0633\u0647 \u0628\u0627 C\/C++ \u0648 Python<\/li>\n<li>\u06f2. \u0646\u0635\u0628 \u0648 \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0645\u062d\u06cc\u0637 \u062a\u0648\u0633\u0639\u0647 (Rustup, Cargo, VSCode)<\/li>\n<li>\u06f3. \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0627\u06a9\u0648\u0633\u06cc\u0633\u062a\u0645: Cargo \u0648 Crates.io<\/li>\n<li>\u06f4. \u0627\u0648\u0644\u06cc\u0646 \u0628\u0631\u0646\u0627\u0645\u0647: Hello, World of Security!<\/li>\n<li>\u06f5. \u0645\u062a\u063a\u06cc\u0631\u0647\u0627\u060c \u062a\u063a\u06cc\u06cc\u0631\u0646\u0627\u067e\u0630\u06cc\u0631\u06cc \u0648 \u0627\u0646\u0648\u0627\u0639 \u062f\u0627\u062f\u0647 \u0627\u0648\u0644\u06cc\u0647<\/li>\n<li>\u06f6. \u062a\u0648\u0627\u0628\u0639\u060c \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627 \u0648 \u0628\u0627\u0632\u06af\u0634\u062a \u0645\u0642\u0627\u062f\u06cc\u0631<\/li>\n<li>\u06f7. \u06a9\u0627\u0645\u0646\u062a\u200c\u06af\u0630\u0627\u0631\u06cc \u0648 \u0645\u0633\u062a\u0646\u062f\u0633\u0627\u0632\u06cc \u06a9\u062f<\/li>\n<li>\u06f8. \u06a9\u0646\u062a\u0631\u0644 \u062c\u0631\u06cc\u0627\u0646: if\/else, match<\/li>\n<li>\u06f9. \u062d\u0644\u0642\u0647\u200c\u0647\u0627: loop, while, for<\/li>\n<li>\u06f1\u06f0. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u0633\u0627\u062e\u062a \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u0633\u0627\u062f\u0647 Command-Line<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u062f\u0648\u0645: \u0645\u0628\u0627\u0646\u06cc Rust \u0628\u0631\u0627\u06cc \u062a\u062d\u0642\u06cc\u0642 \u0627\u0645\u0646\u06cc\u062a\u06cc (\u06f1\u06f5 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f1\u06f1. \u0645\u0641\u0647\u0648\u0645 \u0645\u0627\u0644\u06a9\u06cc\u062a (Ownership): \u06a9\u0644\u06cc\u062f \u0627\u06cc\u0645\u0646\u06cc \u062d\u0627\u0641\u0638\u0647<\/li>\n<li>\u06f1\u06f2. \u0627\u0631\u062c\u0627\u0639 \u0648 \u0642\u0631\u0636\u200c\u06af\u06cc\u0631\u06cc (References &#038; Borrowing)<\/li>\n<li>\u06f1\u06f3. \u0627\u0633\u0644\u0627\u06cc\u0633\u200c\u0647\u0627 (Slices) \u0628\u0631\u0627\u06cc \u06a9\u0627\u0631 \u0628\u0627 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0645\u062a\u0648\u0627\u0644\u06cc<\/li>\n<li>\u06f1\u06f4. \u062a\u0639\u0631\u06cc\u0641 \u0633\u0627\u062e\u062a\u0627\u0631\u0647\u0627\u06cc \u062f\u0627\u062f\u0647 \u0628\u0627 Structs<\/li>\n<li>\u06f1\u06f5. \u0627\u0646\u0648\u0627\u0639 \u0634\u0645\u0627\u0631\u0634\u06cc (Enums) \u0648 Pattern Matching \u0642\u062f\u0631\u062a\u0645\u0646\u062f<\/li>\n<li>\u06f1\u06f6. \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0637\u0627: Result \u0648 Option<\/li>\n<li>\u06f1\u06f7. \u0645\u0627\u0698\u0648\u0644\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u06a9\u062f<\/li>\n<li>\u06f1\u06f8. \u06a9\u0627\u0644\u06a9\u0634\u0646\u200c\u0647\u0627\u06cc \u0631\u0627\u06cc\u062c: Vector, String, HashMap<\/li>\n<li>\u06f1\u06f9. \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc \u0639\u0645\u0648\u0645\u06cc \u0628\u0627 Generics<\/li>\n<li>\u06f2\u06f0. \u0631\u0641\u062a\u0627\u0631\u0647\u0627 \u0648 \u0648\u0627\u0633\u0637\u200c\u0647\u0627 \u0628\u0627 Traits<\/li>\n<li>\u06f2\u06f1. \u0645\u062f\u06cc\u0631\u06cc\u062a \u0637\u0648\u0644 \u0639\u0645\u0631 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0628\u0627 Lifetimes<\/li>\n<li>\u06f2\u06f2. \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0637\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0628\u0627 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u0647\u0627\u06cc anyohow \u0648 thiserror<\/li>\n<li>\u06f2\u06f3. \u06a9\u0644\u0648\u0698\u0631\u0647\u0627 \u0648 \u0627\u06cc\u062a\u0631\u06cc\u062a\u0648\u0631\u0647\u0627 \u0628\u0631\u0627\u06cc \u06a9\u062f\u06cc \u06a9\u0627\u0631\u0622\u0645\u062f\u062a\u0631<\/li>\n<li>\u06f2\u06f4. \u062a\u0633\u062a\u200c\u0646\u0648\u06cc\u0633\u06cc \u062e\u0648\u062f\u06a9\u0627\u0631: Unit \u0648 Integration Tests<\/li>\n<li>\u06f2\u06f5. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u0633\u0627\u062e\u062a \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u062a\u062d\u0644\u06cc\u0644 \u0644\u0627\u06af \u0633\u0627\u062f\u0647<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u0633\u0648\u0645: \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc \u0633\u0637\u062d \u067e\u0627\u06cc\u06cc\u0646 \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062d\u0627\u0641\u0638\u0647 (\u06f1\u06f5 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f2\u06f6. \u0627\u0634\u0627\u0631\u0647\u200c\u06af\u0631\u0647\u0627\u06cc \u062e\u0627\u0645: *const \u0648 *mut<\/li>\n<li>\u06f2\u06f7. \u0628\u0644\u0648\u06a9\u200c\u0647\u0627\u06cc unsafe: \u0686\u0647 \u0632\u0645\u0627\u0646\u06cc \u0648 \u0686\u06af\u0648\u0646\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u0645\u061f<\/li>\n<li>\u06f2\u06f8. Foreign Function Interface (FFI): \u0641\u0631\u0627\u062e\u0648\u0627\u0646\u06cc \u06a9\u062f\u0647\u0627\u06cc C<\/li>\n<li>\u06f2\u06f9. \u0645\u062f\u06cc\u0631\u06cc\u062a \u062f\u0633\u062a\u06cc \u062d\u0627\u0641\u0638\u0647: \u062a\u062e\u0635\u06cc\u0635 \u0648 \u0622\u0632\u0627\u062f\u0633\u0627\u0632\u06cc<\/li>\n<li>\u06f3\u06f0. \u0646\u0645\u0627\u06cc\u0634 \u062f\u0627\u062f\u0647 \u062f\u0631 \u062d\u0627\u0641\u0638\u0647 (Data Layout)<\/li>\n<li>\u06f3\u06f1. Endianness: Big-Endian vs. Little-Endian<\/li>\n<li>\u06f3\u06f2. \u06a9\u0627\u0631 \u0628\u0627 \u0628\u0627\u06cc\u062a\u200c\u0647\u0627 \u0648 \u0628\u0627\u0641\u0631\u0647\u0627<\/li>\n<li>\u06f3\u06f3. \u0639\u0645\u0644\u06cc\u0627\u062a \u0628\u06cc\u062a\u06cc (Bitwise Operations)<\/li>\n<li>\u06f3\u06f4. \u0628\u0647\u06cc\u0646\u0647\u200c\u0633\u0627\u0632\u06cc \u0639\u0645\u0644\u06a9\u0631\u062f \u0628\u0627 SIMD<\/li>\n<li>\u06f3\u06f5. \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Assembly \u062f\u0631\u0648\u0646\u200c\u062e\u0637\u06cc (Inline Assembly)<\/li>\n<li>\u06f3\u06f6. \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0633\u0627\u062e\u062a\u0627\u0631\u0647\u0627\u06cc \u062f\u0627\u062f\u0647 \u0633\u0637\u062d \u067e\u0627\u06cc\u06cc\u0646 (\u0645\u0627\u0646\u0646\u062f \u0644\u06cc\u0633\u062a \u067e\u06cc\u0648\u0646\u062f\u06cc)<\/li>\n<li>\u06f3\u06f7. \u0645\u0628\u0627\u0646\u06cc \u0647\u0645\u0632\u0645\u0627\u0646\u06cc (Concurrency): Threads \u0648 Scoped Threads<\/li>\n<li>\u06f3\u06f8. \u0647\u0645\u06af\u0627\u0645\u200c\u0633\u0627\u0632\u06cc \u0628\u0627 Mutex \u0648 RwLock<\/li>\n<li>\u06f3\u06f9. \u0627\u0631\u062a\u0628\u0627\u0637 \u0628\u06cc\u0646 \u062a\u0631\u062f\u0647\u0627 \u0628\u0627 Channels<\/li>\n<li>\u06f4\u06f0. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u06cc\u06a9 Tracer \u0633\u0627\u062f\u0647 \u0628\u0627 FFI<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u0686\u0647\u0627\u0631\u0645: \u0645\u0647\u0646\u062f\u0633\u06cc \u0645\u0639\u06a9\u0648\u0633 \u0628\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc Rust (\u06f1\u06f0 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f4\u06f1. \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0641\u0631\u0645\u062a\u200c\u0647\u0627\u06cc \u0628\u0627\u06cc\u0646\u0631\u06cc: ELF, PE, Mach-O<\/li>\n<li>\u06f4\u06f2. \u0645\u0639\u0631\u0641\u06cc \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u0647\u0627\u06cc \u062a\u062d\u0644\u06cc\u0644 \u0628\u0627\u06cc\u0646\u0631\u06cc: goblin, object<\/li>\n<li>\u06f4\u06f3. \u0646\u0648\u0634\u062a\u0646 \u06cc\u06a9 Disassembler \u0633\u0627\u062f\u0647 \u0628\u0627 capstone-rs<\/li>\n<li>\u06f4\u06f4. \u062a\u062d\u0644\u06cc\u0644 \u0647\u062f\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc\u06cc<\/li>\n<li>\u06f4\u06f5. \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0631\u0634\u062a\u0647\u200c\u0647\u0627 \u0648 Symbol Table<\/li>\n<li>\u06f4\u06f6. \u0634\u0628\u06cc\u0647\u200c\u0633\u0627\u0632\u06cc CPU \u0648 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0628\u0627 Unicorn Engine<\/li>\n<li>\u06f4\u06f7. \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc Decompilation<\/li>\n<li>\u06f4\u06f8. \u062a\u062d\u0644\u06cc\u0644 \u06af\u0631\u0627\u0641 \u06a9\u0646\u062a\u0631\u0644 \u062c\u0631\u06cc\u0627\u0646 (Control Flow Graph)<\/li>\n<li>\u06f4\u06f9. \u062a\u062d\u0644\u06cc\u0644 \u0627\u0633\u062a\u0627\u062a\u06cc\u06a9 \u062e\u0648\u062f\u06a9\u0627\u0631 \u0628\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc Rust<\/li>\n<li>\u06f5\u06f0. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u0633\u0627\u062e\u062a \u06cc\u06a9 \u062a\u062d\u0644\u06cc\u0644\u06af\u0631 \u0641\u0627\u06cc\u0644 ELF \u067e\u0627\u06cc\u0647<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u067e\u0646\u062c\u0645: \u062a\u062d\u0642\u06cc\u0642 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0648 \u0641\u0627\u0632\u06cc\u0646\u06af (\u06f1\u06f5 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f5\u06f1. \u0645\u0628\u0627\u0646\u06cc \u0641\u0627\u0632\u06cc\u0646\u06af \u0648 \u0627\u0646\u0648\u0627\u0639 \u0622\u0646<\/li>\n<li>\u06f5\u06f2. \u0645\u0639\u0631\u0641\u06cc \u0627\u0628\u0632\u0627\u0631\u0647\u0627: libFuzzer \u0648 AFL++<\/li>\n<li>\u06f5\u06f3. \u0646\u0648\u0634\u062a\u0646 Fuzzing Harness \u0628\u0627 `cargo-fuzz`<\/li>\n<li>\u06f5\u06f4. \u0641\u0627\u0632\u06cc\u0646\u06af \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u067e\u0648\u0634\u0634 \u06a9\u062f (Coverage-guided Fuzzing)<\/li>\n<li>\u06f5\u06f5. \u0641\u0627\u0632\u06cc\u0646\u06af \u0633\u0627\u062e\u062a\u0627\u0631\u06cc\u0627\u0641\u062a\u0647 (Structure-aware Fuzzing)<\/li>\n<li>\u06f5\u06f6. \u0641\u0627\u0632\u06cc\u0646\u06af \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u06af\u0631\u0627\u0645\u0631 (Grammar-based Fuzzing)<\/li>\n<li>\u06f5\u06f7. \u0641\u0627\u0632\u06cc\u0646\u06af \u062a\u0641\u0627\u0636\u0644\u06cc (Differential Fuzzing)<\/li>\n<li>\u06f5\u06f8. \u062a\u062d\u0644\u06cc\u0644 \u06a9\u0631\u0634\u200c\u0647\u0627 \u0648 \u06cc\u0627\u0641\u062a\u0646 \u0631\u06cc\u0634\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc<\/li>\n<li>\u06f5\u06f9. \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Sanitizer\u0647\u0627 (ASan, TSan, MSan)<\/li>\n<li>\u06f6\u06f0. \u062e\u0648\u062f\u06a9\u0627\u0631\u0633\u0627\u0632\u06cc \u0641\u0631\u0622\u06cc\u0646\u062f \u062a\u062d\u0644\u06cc\u0644 \u06a9\u0631\u0634<\/li>\n<li>\u06f6\u06f1. \u0641\u0627\u0632\u06cc\u0646\u06af \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647<\/li>\n<li>\u06f6\u06f2. \u0641\u0627\u0632\u06cc\u0646\u06af API\u0647\u0627\u06cc \u0648\u0628 \u0648 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u0647\u0627<\/li>\n<li>\u06f6\u06f3. \u0641\u0627\u0632\u06cc\u0646\u06af \u0641\u0627\u06cc\u0644 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627 \u0648 Parser\u0647\u0627<\/li>\n<li>\u06f6\u06f4. \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0628\u0647\u06cc\u0646\u0647\u200c\u0633\u0627\u0632\u06cc \u0641\u0631\u0622\u06cc\u0646\u062f \u0641\u0627\u0632\u06cc\u0646\u06af<\/li>\n<li>\u06f6\u06f5. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u0641\u0627\u0632\u06cc\u0646\u06af \u06cc\u06a9 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 \u0645\u0639\u0631\u0648\u0641 \u062a\u0635\u0648\u06cc\u0631<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u0634\u0634\u0645: \u062a\u0648\u0633\u0639\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u062f\u0631 Rust (\u06f1\u06f5 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f6\u06f6. \u0645\u0631\u0648\u0631 \u0627\u0646\u0648\u0627\u0639 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u062d\u0627\u0641\u0638\u0647<\/li>\n<li>\u06f6\u06f7. \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a Stack-based Buffer Overflow<\/li>\n<li>\u06f6\u06f8. \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a Heap-based Buffer Overflow<\/li>\n<li>\u06f6\u06f9. \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Integer Overflow<\/li>\n<li>\u06f7\u06f0. \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a Use After Free (UAF)<\/li>\n<li>\u06f7\u06f1. \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a Double Free<\/li>\n<li>\u06f7\u06f2. \u0646\u0648\u0634\u062a\u0646 Shellcode \u062f\u0631 Rust \u0648 \u0627\u0633\u0645\u0628\u0644\u06cc<\/li>\n<li>\u06f7\u06f3. \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc ROP (Return-Oriented Programming)<\/li>\n<li>\u06f7\u06f4. \u062f\u0648\u0631 \u0632\u062f\u0646 \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc: ASLR, DEP\/NX, Stack Canaries<\/li>\n<li>\u06f7\u06f5. \u0646\u0648\u0634\u062a\u0646 \u06cc\u06a9 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u06a9\u0627\u0645\u0644 \u0628\u0631\u0627\u06cc Stack Overflow<\/li>\n<li>\u06f7\u06f6. \u06a9\u0627\u0631 \u0628\u0627 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u0647\u0627\u06cc Pwntools \u062f\u0631 Rust<\/li>\n<li>\u06f7\u06f7. \u062a\u0648\u0633\u0639\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Heap<\/li>\n<li>\u06f7\u06f8. \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc Heap Grooming \u0648 Heap Spraying<\/li>\n<li>\u06f7\u06f9. \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Race Condition<\/li>\n<li>\u06f8\u06f0. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u06cc\u06a9 \u0628\u0631\u0646\u0627\u0645\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0646\u0645\u0648\u0646\u0647 \u0627\u0632 \u0627\u0628\u062a\u062f\u0627 \u062a\u0627 \u0627\u0646\u062a\u0647\u0627<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u0647\u0641\u062a\u0645: \u062a\u062d\u0644\u06cc\u0644 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0648 \u0627\u0628\u0632\u0627\u0631\u0633\u0627\u0632\u06cc (\u06f1\u06f0 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f8\u06f1. \u0645\u0628\u0627\u0646\u06cc \u062a\u062d\u0644\u06cc\u0644 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 (\u0627\u0633\u062a\u0627\u062a\u06cc\u06a9 \u0648 \u062f\u06cc\u0646\u0627\u0645\u06cc\u06a9)<\/li>\n<li>\u06f8\u06f2. \u062a\u062d\u0644\u06cc\u0644 \u0627\u0633\u062a\u0627\u062a\u06cc\u06a9: \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0631\u0634\u062a\u0647\u200c\u0647\u0627\u060c API\u0647\u0627 \u0648 IAT<\/li>\n<li>\u06f8\u06f3. \u062a\u062d\u0644\u06cc\u0644 \u062f\u06cc\u0646\u0627\u0645\u06cc\u06a9 \u062f\u0631 \u06cc\u06a9 \u0645\u062d\u06cc\u0637 \u0627\u06cc\u0632\u0648\u0644\u0647 (Sandbox)<\/li>\n<li>\u06f8\u06f4. \u0646\u0648\u0634\u062a\u0646 \u06cc\u06a9 \u0627\u0633\u06a9\u0646\u0631 \u0642\u0648\u0627\u0646\u06cc\u0646 YARA \u062f\u0631 Rust<\/li>\n<li>\u06f8\u06f5. \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc Unpacking \u0648 Deobfuscation<\/li>\n<li>\u06f8\u06f6. \u062a\u062d\u0644\u06cc\u0644 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0634\u0628\u06a9\u0647 \u0648 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u062a\u0631\u0627\u0641\u06cc\u06a9<\/li>\n<li>\u06f8\u06f7. \u0633\u0627\u062e\u062a \u06cc\u06a9 C2 Client\/Server \u0633\u0627\u062f\u0647<\/li>\n<li>\u06f8\u06f8. \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u062a\u06a9\u0646\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0641\u0631\u0627\u0631 \u0627\u0632 \u0622\u0646\u062a\u06cc\u200c\u0648\u06cc\u0631\u0648\u0633 (Anti-VM, Anti-Debug)<\/li>\n<li>\u06f8\u06f9. \u062a\u062d\u0644\u06cc\u0644 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627<\/li>\n<li>\u06f9\u06f0. \u067e\u0631\u0648\u0698\u0647 \u0641\u0635\u0644: \u062a\u062d\u0644\u06cc\u0644 \u06cc\u06a9 \u0646\u0645\u0648\u0646\u0647 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0648\u0627\u0642\u0639\u06cc \u0648 \u0646\u0648\u0634\u062a\u0646 \u06af\u0632\u0627\u0631\u0634 \u06a9\u0627\u0645\u0644<\/li>\n<\/ul>\n<h3>\u0641\u0635\u0644 \u0647\u0634\u062a\u0645: \u0645\u0628\u0627\u062d\u062b \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0648 \u067e\u0631\u0648\u0698\u0647 \u067e\u0627\u06cc\u0627\u0646\u06cc (\u06f1\u06f0 \u0633\u0631\u0641\u0635\u0644)<\/h3>\n<ul>\n<li>\u06f9\u06f1. \u0627\u0645\u0646\u06cc\u062a WebAssembly (WASM): \u062a\u062d\u0644\u06cc\u0644 \u0648 \u0627\u0628\u0632\u0627\u0631\u0633\u0627\u0632\u06cc<\/li>\n<li>\u06f9\u06f2. \u0646\u0648\u0634\u062a\u0646 \u0645\u0627\u0698\u0648\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646 \u0628\u0631\u0627\u06cc \u06a9\u0631\u0646\u0644 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0627 Rust<\/li>\n<li>\u06f9\u06f3. \u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0646\u0647\u0641\u062a\u0647 (Embedded) \u0648 IoT \u0628\u0627 Rust<\/li>\n<li>\u06f9\u06f4. \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u062d\u0645\u0644\u0627\u062a Side-channel<\/li>\n<li>\u06f9\u06f5. \u0645\u0628\u0627\u062d\u062b \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0628\u0627 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647\u200c\u0647\u0627\u06cc RustCrypto<\/li>\n<li>\u06f9\u06f6. \u067e\u0631\u0648\u0698\u0647 \u0646\u0647\u0627\u06cc\u06cc: \u0633\u0627\u062e\u062a \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc \u06a9\u0627\u0645\u0644 (\u0645\u0627\u0646\u0646\u062f \u0627\u0633\u06a9\u0646\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc)<\/li>\n<li>\u06f9\u06f7. \u062c\u0645\u0639\u200c\u0628\u0646\u062f\u06cc \u0648 \u0645\u0631\u0648\u0631 \u0645\u0641\u0627\u0647\u06cc\u0645 \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0648\u0631\u0647<\/li>\n<li>\u06f9\u06f8. \u0628\u0647\u062a\u0631\u06cc\u0646 \u0631\u0648\u0634\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0645\u0634\u0627\u0631\u06a9\u062a \u062f\u0631 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0645\u062a\u0646-\u0628\u0627\u0632 \u0627\u0645\u0646\u06cc\u062a\u06cc<\/li>\n<li>\u06f9\u06f9. \u0622\u0645\u0627\u062f\u06af\u06cc \u0628\u0631\u0627\u06cc \u0645\u0635\u0627\u062d\u0628\u0647\u200c\u0647\u0627\u06cc \u0634\u063a\u0644\u06cc \u062f\u0631 \u062d\u0648\u0632\u0647 Rust \u0648 \u0627\u0645\u0646\u06cc\u062a<\/li>\n<li>\u06f1\u06f0\u06f0. \u0645\u0633\u06cc\u0631\u0647\u0627\u06cc \u0627\u062f\u0627\u0645\u0647 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0648 \u0645\u0646\u0627\u0628\u0639 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647<\/li>\n<\/ul>\n<p><\/body><br \/>\n<\/html><\/div>\n<div\r\n    style=\"border: 2px dashed #4CAF50; border-radius: 16px; padding: 20px; background: #f9fff9; font-family: 'IRANSans', sans-serif;\">\r\n    <h2 style=\"color: #2E7D32; margin-top: 0;\">\ud83d\udcda \u0645\u062d\u062a\u0648\u0627\u06cc \u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0622\u0645\u0648\u0632\u0634\u06cc (\u067e\u06a9\u06cc\u062c \u06a9\u0627\u0645\u0644)<\/h2>\r\n    <div\r\n        style=\"background: #E8F5E9; border-radius: 12px; padding: 15px 20px; margin-bottom: 20px; border: 1px solid #A5D6A7;\">\r\n        <h3 style=\"color: #1B5E20; margin-top: 0;\">\ud83d\udca1 \u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u06cc\u06a9 \u0646\u0633\u062e\u0647\u0654 \u06a9\u0627\u0645\u0644 \u0648 \u062c\u0627\u0645\u0639 \u0627\u0633\u062a<\/h3>\r\n        <p style=\"font-size:16px; line-height:1.8; color:#2E7D32; margin:0;\"> \u062a\u0645\u0627\u0645\u06cc \u0645\u062d\u062a\u0648\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u062f\u0631 \u0642\u0627\u0644\u0628 \u06cc\u06a9\r\n            \u0628\u0633\u062a\u0647\u200c\u06cc \u06a9\u0627\u0645\u0644 \u0648 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0634\u0627\u0645\u0644 \u062a\u0645\u0627\u0645 \u0646\u0633\u062e\u0647\u200c\u0647\u0627 \u0648 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0645\u0648\u0631\u062f\u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0627\u0633\u062a. <\/p>\r\n    <\/div>\r\n    <h3 style=\"color: #2E7D32;\">\ud83c\udf81 \u0645\u062d\u062a\u0648\u06cc\u0627\u062a \u06a9\u0627\u0645\u0644 \u0628\u0633\u062a\u0647 \u062f\u0627\u0646\u0644\u0648\u062f\u06cc<\/h3>\r\n\r\n\t\r\n<ul style=\"list-style-type: '\u2705 '; padding-left: 20px; font-size: 16px; line-height: 1.8;\">\r\n    <li><strong>\u0648\u06cc\u062f\u06cc\u0648\u0647\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u0622\u0645\u0648\u0632\u0634 \u0642\u062f\u0645\u200c\u0628\u0647\u200c\u0642\u062f\u0645\u060c \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648 \u0642\u0627\u0628\u0644 \u0641\u0647\u0645<\/li>\r\n    <li><strong>\u067e\u0627\u062f\u06a9\u0633\u062a\u200c\u0647\u0627\u06cc \u0635\u0648\u062a\u06cc \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u062a\u0648\u0636\u06cc\u062d \u0645\u0641\u0627\u0647\u06cc\u0645 \u06a9\u0644\u06cc\u062f\u06cc \u0648 \u0646\u06a9\u0627\u062a \u062a\u06a9\u0645\u06cc\u0644\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 PDF \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u0634\u0627\u0645\u0644 \u06a9\u0644\u06cc\u0647\u0654 \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627 \u0648 \u0645\u062d\u062a\u0648\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u062e\u0644\u0627\u0635\u0647 \u0646\u06a9\u0627\u062a \u0648\u06cc\u062f\u06cc\u0648\u0647\u0627 \u0648 \u067e\u0627\u062f\u06a9\u0633\u062a\u200c\u0647\u0627 \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0645\u0646\u0627\u0633\u0628 \u0645\u0631\u0648\u0631 \u0633\u0631\u06cc\u0639 \u0648 \u062c\u0645\u0639\u200c\u0628\u0646\u062f\u06cc \u0645\u0628\u0627\u062d\u062b<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u0646\u06a9\u062a\u0647 \u0641\u0627\u0631\u0633\u06cc (\u062e\u0648\u062f\u0645\u0648\u0646\u06cc) \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0632\u0628\u0627\u0646 \u0633\u0627\u062f\u0647 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u0646\u06a9\u062a\u0647 \u0631\u0633\u0645\u06cc \u0641\u0627\u0631\u0633\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0646\u06af\u0627\u0631\u0634 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u060c \u0639\u0644\u0645\u06cc \u0648 \u0645\u0646\u0627\u0633\u0628 \u0686\u0627\u067e<\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u062a\u0634\u0631\u06cc\u062d\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u0647\u0631 \u0633\u0624\u0627\u0644 \u0628\u0644\u0627\u0641\u0627\u0635\u0644\u0647 \u0647\u0645\u0631\u0627\u0647 \u0628\u0627 \u067e\u0627\u0633\u062e \u06a9\u0627\u0645\u0644 \u0648 \u0634\u0641\u0627\u0641 \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0645\u0646\u0627\u0633\u0628 \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0648 \u0631\u0641\u0639 \u0627\u0628\u0647\u0627\u0645.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u0686\u0647\u0627\u0631\u06af\u0632\u06cc\u0646\u0647\u200c\u0627\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF (\u0646\u0633\u062e\u0647 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0633\u0631\u06cc\u0639)<\/strong><br>\r\n        \u2014 \u067e\u0627\u0633\u062e\u200c\u0647\u0627 \u0628\u0644\u0627\u0641\u0627\u0635\u0644\u0647 \u067e\u0633 \u0627\u0632 \u0633\u0624\u0627\u0644 \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f\u061b \u0645\u0646\u0627\u0633\u0628 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0633\u0631\u06cc\u0639 \u0648 \u062a\u062b\u0628\u06cc\u062a \u0645\u0637\u0627\u0644\u0628.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u0686\u0647\u0627\u0631\u06af\u0632\u06cc\u0646\u0647\u200c\u0627\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF (\u0646\u0633\u062e\u0647 \u062e\u0648\u062f\u0622\u0632\u0645\u0627\u06cc\u06cc \u067e\u0627\u06cc\u0627\u0646\u200c\u0628\u062e\u0634)<\/strong><br>\r\n        \u2014 \u067e\u0627\u0633\u062e\u200c\u0647\u0627 \u062f\u0631 \u0627\u0646\u062a\u0647\u0627\u06cc \u0647\u0631 \u0628\u062e\u0634 \u0622\u0645\u062f\u0647\u200c\u0627\u0646\u062f\u061b \u0645\u0646\u0627\u0633\u0628 \u0622\u0632\u0645\u0648\u0646 \u0648\u0627\u0642\u0639\u06cc \u0648 \u0633\u0646\u062c\u0634 \u0645\u06cc\u0632\u0627\u0646 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627\u06cc \u062f\u0631\u0633\u062a \/ \u0646\u0627\u062f\u0631\u0633\u062a (True \/ False) \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u0645\u0646\u0627\u0633\u0628 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0642\u062a \u0645\u0641\u0647\u0648\u0645\u06cc \u0648 \u062a\u0634\u062e\u06cc\u0635 \u0635\u062d\u06cc\u062d \u06cc\u0627 \u0646\u0627\u062f\u0631\u0633\u062a \u0628\u0648\u062f\u0646 \u06af\u0632\u0627\u0631\u0647\u200c\u0647\u0627.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627\u06cc \u062c\u0627\u06cc \u062e\u0627\u0644\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u062a\u0642\u0648\u06cc\u062a \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0641\u0639\u0627\u0644 \u0648 \u062a\u0633\u0644\u0637 \u0628\u0631 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0648 \u0627\u0635\u0637\u0644\u0627\u062d\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc.\r\n    <\/li>\r\n<\/ul>\r\n\t\r\n\t\r\n\t\r\n\t\r\n    <p style=\"color: #388E3C; font-weight: bold; font-size: 18px; margin-top: 20px;\"> \ud83c\udfaf \u0627\u06cc\u0646 \u0628\u0633\u062a\u0647 \u06cc\u06a9 \u062f\u0648\u0631\u0647\u0654 \u0622\u0645\u0648\u0632\u0634\u06cc \u06a9\u0627\u0645\u0644 \u0648\r\n        \u0686\u0646\u062f\u0644\u0627\u06cc\u0647 \u0627\u0633\u062a\u061b \u0634\u0627\u0645\u0644 \u0622\u0645\u0648\u0632\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc\u060c \u0635\u0648\u062a\u06cc\u060c \u06a9\u062a\u0627\u0628\u200c\u0647\u0627\u060c \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627   \u0648 \u062e\u0648\u062f\u0622\u0632\u0645\u0627\u06cc\u06cc . <\/p>\r\n    <hr style=\"border: none; border-top: 1px dashed #81C784; margin: 20px 0;\">\r\n    <h3 style=\"color: #2E7D32;\">\u2139\ufe0f \u0646\u06a9\u0627\u062a \u0645\u0647\u0645 \u0647\u0646\u06af\u0627\u0645 \u062e\u0631\u06cc\u062f<\/h3>\r\n    <ul style=\"list-style-type: '\ud83d\udd38 '; padding-left: 20px; font-size: 15px; line-height: 1.9;\">\r\n        <li>\u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0635\u0648\u0631\u062a <strong>\u0641\u0627\u06cc\u0644 \u062f\u0627\u0646\u0644\u0648\u062f\u06cc \u06a9\u0627\u0645\u0644<\/strong> \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0646\u0633\u062e\u0647\u0654 \u0686\u0627\u067e\u06cc \u0646\u062f\u0627\u0631\u062f.<\/li>\r\n        <li>\u062a\u0645\u0627\u0645\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u06a9\u062a\u0627\u0628\u200c\u0647\u0627 <strong>\u06a9\u0627\u0645\u0644\u0627\u064b \u0641\u0627\u0631\u0633\u06cc<\/strong> \u0647\u0633\u062a\u0646\u062f.<\/li>\r\n        <li><strong>\u062a\u0648\u062c\u0647:<\/strong> \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627\u06cc \u0627\u062e\u062a\u0635\u0627\u0635\u06cc \u062f\u0648\u0631\u0647 \u0637\u06cc <strong>\u06f4\u06f8 \u0633\u0627\u0639\u062a<\/strong> \u067e\u0633 \u0627\u0632 \u062b\u0628\u062a \u0633\u0641\u0627\u0631\u0634 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f.<\/li>\r\n        <li>\u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062f\u0631\u062c \u0634\u0645\u0627\u0631\u0647 \u0645\u0648\u0628\u0627\u06cc\u0644 \u0646\u06cc\u0633\u062a\u061b \u0627\u0645\u0627 \u0628\u0631\u0627\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0633\u0631\u06cc\u0639\u200c\u062a\u0631 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/li>\r\n        <li>\u062f\u0631 \u0635\u0648\u0631\u062a \u0628\u0631\u0648\u0632 \u0645\u0634\u06a9\u0644 \u062f\u0631 \u062f\u0627\u0646\u0644\u0648\u062f \u0628\u0627 \u0634\u0645\u0627\u0631\u0647 <strong>09395106248<\/strong> \u062a\u0645\u0627\u0633 \u0628\u06af\u06cc\u0631\u06cc\u062f.<\/li>\r\n        <li>\u0627\u06af\u0631 \u067e\u0631\u062f\u0627\u062e\u062a \u0627\u0646\u062c\u0627\u0645 \u0634\u062f\u0647 \u0648\u0644\u06cc \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627 \u0631\u0627 \u062f\u0631\u06cc\u0627\u0641\u062a \u0646\u06a9\u0631\u062f\u0647\u200c\u0627\u06cc\u062f\u060c \u0646\u0627\u0645 \u0648 \u0646\u0627\u0645 \u062e\u0627\u0646\u0648\u0627\u062f\u06af\u06cc \u0648 \u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0631\u0627 \u067e\u06cc\u0627\u0645\u06a9 \u06a9\u0646\u06cc\u062f \u062a\u0627\r\n            \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627 \u062f\u0648\u0628\u0627\u0631\u0647 \u0627\u0631\u0633\u0627\u0644 \u0634\u0648\u0646\u062f.<\/li>\r\n    <\/ul>\r\n    <p style=\"font-size: 16px; line-height: 1.8; margin-top: 15px;\"> \ud83d\udcac \u0631\u0627\u0647\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc:<br> \u0648\u0627\u062a\u0633\u200c\u0627\u067e \u06cc\u0627 \u067e\u06cc\u0627\u0645\u06a9:\r\n        <strong>09395106248<\/strong><br> \u062a\u0644\u06af\u0631\u0627\u0645: <strong>@ma_limbs<\/strong> <\/p>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc Rust and Security Research: Investigating Emerging Security Threats \u062f\u0648\u0631\u0647 \u062c\u0627\u0645\u0639 Rust and Security Research: \u06a9\u0634\u0641 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u0648\u0638\u0647\u0648\u0631 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647: \u0628\u0647 \u062e\u0637 \u0645\u0642\u062f\u0645 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0627 Rust \u0628\u067e\u06cc\u0648&#8230;<\/p>\n","protected":false},"featured_media":67493,"comment_status":"open","ping_status":"closed","template":"","meta":{"pmpro_default_level":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"product_cat":[196,1221,213234],"product_tag":[630,713,1979,230519,230522,42088,46884,59835,120458,166721,230517,42229,501,716,230521,230520,61557,59267,4840,230518],"class_list":{"0":"post-254475","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-196","7":"product_cat-1221","8":"product_cat--rust","9":"product_tag-cybersecurity","10":"product_tag-programming","11":"product_tag-rust","12":"product_tag-rust-and-security","13":"product_tag-secure-coding-with-rust","14":"product_tag-secure-development","15":"product_tag-security","16":"product_tag-security-research","17":"product_tag-security-threats","18":"product_tag-security-vulnerability","19":"product_tag-230517","20":"product_tag-42229","21":"product_tag-501","22":"product_tag-716","23":"product_tag-230521","24":"product_tag-230520","25":"product_tag-61557","26":"product_tag-59267","27":"product_tag-4840","28":"product_tag-230518","29":"pmpro-has-access","30":"desktop-align-left","31":"tablet-align-left","32":"mobile-align-left","34":"first","35":"instock","36":"shipping-taxable","37":"purchasable","38":"product-type-variable"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"og:description\" content=\"\u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc Rust and Security Research: Investigating Emerging Security Threats \u062f\u0648\u0631\u0647 \u062c\u0627\u0645\u0639 Rust and Security Research: \u06a9\u0634\u0641 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u0648\u0638\u0647\u0648\u0631 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647: \u0628\u0647 \u062e\u0637 \u0645\u0642\u062f\u0645 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0627 Rust \u0628\u067e\u06cc\u0648...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:02:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/05\/Express24_ir.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 \u062f\u0642\u06cc\u0642\u0647\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/\",\"url\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/\",\"name\":\"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"isPartOf\":{\"@id\":\"https:\/\/express24.ir\/d\/#website\"},\"datePublished\":\"2025-11-29T03:16:17+00:00\",\"dateModified\":\"2025-12-22T11:02:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/express24.ir\/d\/#website\",\"url\":\"https:\/\/express24.ir\/d\/\",\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/express24.ir\/d\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fa-IR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/","og_locale":"fa_IR","og_type":"article","og_title":"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","og_description":"\u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc Rust and Security Research: Investigating Emerging Security Threats \u062f\u0648\u0631\u0647 \u062c\u0627\u0645\u0639 Rust and Security Research: \u06a9\u0634\u0641 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u0648\u0638\u0647\u0648\u0631 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647: \u0628\u0647 \u062e\u0637 \u0645\u0642\u062f\u0645 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0627 Rust \u0628\u067e\u06cc\u0648...","og_url":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/","og_site_name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","article_modified_time":"2025-12-22T11:02:46+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/05\/Express24_ir.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646":"4 \u062f\u0642\u06cc\u0642\u0647"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/","url":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/","name":"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","isPartOf":{"@id":"https:\/\/express24.ir\/d\/#website"},"datePublished":"2025-11-29T03:16:17+00:00","dateModified":"2025-12-22T11:02:46+00:00","breadcrumb":{"@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000010649\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":2,"name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":3,"name":"\u06a9\u062a\u0627\u0628 Rust and Security Research: Investigating Emerging Security Threats"}]},{"@type":"WebSite","@id":"https:\/\/express24.ir\/d\/#website","url":"https:\/\/express24.ir\/d\/","name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/express24.ir\/d\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fa-IR"}]}},"_links":{"self":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product\/254475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/comments?post=254475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media\/67493"}],"wp:attachment":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media?parent=254475"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_cat?post=254475"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_tag?post=254475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}