{"id":22621,"date":"2025-10-24T09:50:24","date_gmt":"2025-10-24T09:50:24","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=22621"},"modified":"2025-12-11T15:48:43","modified_gmt":"2025-12-11T15:48:43","slug":"prism","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/","title":{"rendered":"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading purple-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026<\/h1>\n\n\n\n<p>Co-located with NDSS Symposium 2026, San Diego, CA<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding padding-bottom-0 is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p>Modern cyber attacks are increasingly sophisticated, stealthy, and multi-stage, often exploiting diverse infrastructures ranging from enterprise networks and cloud platforms to IoT devices, cyber-physical systems (CPS), and operational technology (OT). Attackers leave behind fragmented traces across logs, alerts, forensic artifacts, and external threat intelligence sources. Reconstructing the \u201cbig picture\u201d from these scattered signals\u2014identifying root causes, correlating events across domains, and understanding causal chains\u2014is one of the most critical and challenging problems in cybersecurity today.<\/p>\n\n\n\n<p>Attack provenance and causal investigation have therefore emerged as essential capabilities for defenders. Provenance-based reasoning allows analysts to connect low-level signals into coherent narratives, attribute attacks to root causes, and generate actionable intelligence for detection, mitigation, and prevention. This workshop aims to bring together researchers, practitioners, and policy makers from academia, industry, and government to advance the theory, methodology, and practice of provenance-driven security, while fostering collaboration across areas of cybersecurity research and operations.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding symposium-tiles is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n\n\n\n\n<div class=\"wp-block-group single-tile is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" version=\"1.1\" id=\"submissions-80x88\" x=\"0px\" y=\"0px\" viewbox=\"0 0 80.9 88.1\" width=\"80\" height=\"88\" style=\"enable-background:new 0 0 80.9 88.1;\" xml:space=\"preserve\" aria-hidden=\"true\"><g id=\"Group_411\" transform=\"translate(0.054 0)\"> <path id=\"Rectangle_176\" class=\"st0 st-purple\" d=\"M13.7,36.7H45c1.1,0,2,0.9,2,2v1.9c0,1.1-0.9,2-2,2H13.7c-1.1,0-2-0.9-2-2v-1.9 C11.7,37.6,12.6,36.7,13.7,36.7z\"><\/path> <path id=\"Rectangle_177\" class=\"st0 st-purple\" d=\"M13.7,26.4H45c1.1,0,2,0.9,2,2v1.9c0,1.1-0.9,2-2,2H13.7c-1.1,0-2-0.9-2-2v-1.9 C11.7,27.3,12.6,26.4,13.7,26.4z\"><\/path> <path id=\"Path_3048\" class=\"st0 st-purple\" d=\"M80.4,33l-8.8-8.8c-0.6-0.6-1.5-0.6-2.1,0L60.6,33c-0.6,0.6-0.6,1.5,0,2.1l2.1,2.1 c0.6,0.6,1.5,0.6,2.1,0l2.8-2.8v47.9H27.9c-0.8,0-1.5,0.7-1.5,1.5l0,0v2.9c0,0.8,0.7,1.5,1.5,1.5h0H72c0.8,0,1.5-0.7,1.5-1.5l0,0 V34.4l2.8,2.8c0.6,0.6,1.5,0.6,2.1,0l2.1-2.1C80.9,34.5,80.9,33.6,80.4,33z\"><\/path> <path id=\"Path_3049\" class=\"st0 st-purple\" d=\"M5.9,5.9h47v64.6h-25c-0.8,0-1.5,0.7-1.5,1.5l0,0v2.9c0,0.8,0.7,1.5,1.5,1.5h0h30.8V1.5 c0-0.8-0.7-1.5-1.5-1.5l0,0H1.4C0.6,0,0,0.6,0,1.4v47.1c0,0.8,0.7,1.5,1.5,1.5h0h2.9c0.8,0,1.5-0.7,1.5-1.5l0,0L5.9,5.9z\"><\/path> <\/g> <path id=\"Path_3050\" class=\"st1 st-white\" d=\"M1.5,54.4h3c0.8,0,1.4,0.6,1.5,1.4c0.7,7.8,6.9,14.1,14.7,14.7c0.8,0.1,1.4,0.7,1.4,1.5v3 c0,0.8-0.7,1.5-1.5,1.5c0,0-0.1,0-0.1,0C9.5,75.5,0.8,66.9,0,55.9c-0.1-0.8,0.6-1.5,1.4-1.6C1.4,54.4,1.4,54.4,1.5,54.4z\"><\/path> <\/svg>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Submissions<\/strong><\/h3>\n\n\n\n<p>The call for papers is open until 2 January 2026.<\/p>\n<\/div><\/div>\n\n\n\n<p><a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\"><strong>Read More Submissions<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-tile is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" version=\"1.1\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewbox=\"0 0 91.5 91.5\" width=\"91\" height=\"91\" style=\"enable-background:new 0 0 91.5 91.5;\" xml:space=\"preserve\" aria-hidden=\"true\"><path id=\"Path_3061\" class=\"st0 st-white\" d=\"M26.4,45.7c-0.8,0-1.5-0.7-1.5-1.5c0-0.1,0-0.3,0.1-0.4c1.5-5.2,6.3-8.7,11.7-8.7h18.3 c5.4,0,10.2,3.6,11.7,8.7c0.2,0.8-0.2,1.6-1,1.9c-0.1,0-0.3,0.1-0.4,0.1h-3.3c-0.6,0-1.2-0.4-1.4-1c-1-2.2-3.2-3.6-5.6-3.6H36.6 c-2.4,0-4.6,1.4-5.6,3.6c-0.2,0.6-0.8,0.9-1.4,1L26.4,45.7z\"><\/path> <path id=\"Path_3062\" class=\"st1 st-purple\" d=\"M45.7,30.5c-8.4,0-15.2-6.8-15.2-15.2S37.3,0,45.7,0C54.2,0,61,6.8,61,15.2 C61,23.7,54.2,30.5,45.7,30.5z M45.7,6.1c-5.1,0-9.1,4.1-9.1,9.1c0,5.1,4.1,9.1,9.1,9.1s9.1-4.1,9.1-9.1 C54.9,10.2,50.8,6.1,45.7,6.1L45.7,6.1z M75.5,39.6c-6.3,0-11.4-5.1-11.4-11.4c0-6.3,5.1-11.4,11.4-11.4c6.3,0,11.4,5.1,11.4,11.4 c0,0,0,0,0,0C86.9,34.5,81.8,39.6,75.5,39.6z M75.5,22.9c-2.9,0-5.3,2.4-5.3,5.3s2.4,5.3,5.3,5.3s5.3-2.4,5.3-5.3v0 C80.8,25.3,78.4,22.9,75.5,22.9z M16,39.6c-6.3,0-11.4-5.1-11.4-11.4S9.7,16.8,16,16.8s11.4,5.1,11.4,11.4c0,0,0,0,0,0 C27.4,34.5,22.3,39.6,16,39.6z M16,22.9c-2.9,0-5.3,2.4-5.3,5.3c0,2.9,2.4,5.3,5.3,5.3s5.3-2.4,5.3-5.3l0,0 C21.3,25.3,19,22.9,16,22.9z M79.3,50.3H62.5c-0.8,0-1.5,0.7-1.5,1.5c0,0,0,0,0,0v33.5H30.5V51.8c0-0.8-0.7-1.5-1.5-1.5c0,0,0,0,0,0 H12.2C5.5,50.3,0,55.8,0,62.5v21.3c0,0.8,0.7,1.5,1.5,1.5c0,0,0,0,0,0h22.9V90c0,0.8,0.7,1.5,1.5,1.5c0,0,0,0,0,0h39.6 c0.8,0,1.5-0.7,1.5-1.5c0,0,0,0,0,0v-4.6H90c0.8,0,1.5-0.7,1.5-1.5c0,0,0,0,0,0V62.5C91.5,55.8,86,50.3,79.3,50.3z M24.4,79.3H6.1 V62.5c0-3.4,2.7-6.1,6.1-6.1h12.2L24.4,79.3z M85.4,79.3H67.1V56.4h12.2c3.4,0,6.1,2.7,6.1,6.1L85.4,79.3z\"><\/path> <\/svg>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Leadership<\/strong><\/h3>\n\n\n\n<p>Organizing Committee and Technical Program Committee.<\/p>\n<\/div><\/div>\n\n\n\n<p><a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/leadership\/\"><strong>Read More Leadership<\/strong><\/a><\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-1110 section-padding padding-top-0 padding-bottom-0 section-ndss-sponsors is-layout-flow wp-block-group-is-layout-flow advgb-dyn-66195f11\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group section-title-r is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">PRISM 2026 Best Paper Award Sponsor<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.paloaltonetworks.com\/\"><img loading=\"lazy\" decoding=\"async\" width=\"241\" height=\"44\" src=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg\" alt=\"Paloalto Logo\" class=\"wp-image-10456\" style=\"width:200px\"><\/a><\/figure>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 Co-located with NDSS Symposium 2026, San Diego, CA Modern cyber attacks are increasingly sophisticated, stealthy, and multi-stage, often exploiting diverse infrastructures ranging from enterprise networks and cloud platforms to IoT devices, cyber-physical systems (CPS), and operational technology (OT). Attackers leave &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\">Continued<\/a><\/p>\n","protected":false},"author":237,"featured_media":0,"parent":22295,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-22621","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T15:48:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\",\"name\":\"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg\",\"datePublished\":\"2025-10-24T09:50:24+00:00\",\"dateModified\":\"2025-12-11T15:48:43+00:00\",\"description\":\"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg\",\"width\":241,\"height\":44,\"caption\":\"Paloalto Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Co-located Events 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium","description":"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/","og_locale":"en_US","og_type":"article","og_title":"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium","og_description":"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-12-11T15:48:43+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/","url":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/","name":"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg","datePublished":"2025-10-24T09:50:24+00:00","dateModified":"2025-12-11T15:48:43+00:00","description":"Join us at PRISM 2026, a workshop dedicated to advancing the theory, methodology, and practice of provenance-driven security.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#primaryimage","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/Paloalto-241x44-1.svg","width":241,"height":44,"caption":"Paloalto Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/prism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/"},{"@type":"ListItem","position":3,"name":"Co-located Events 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/co-located-events\/"},{"@type":"ListItem","position":4,"name":"Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/strinekatrbovic\/","display_name":"Ivana Trbovic"},"relative_dates":{"created":"Posted 2 months ago","modified":"Updated 2 days ago"},"absolute_dates":{"created":"Posted on 24 October 2025","modified":"Updated on 11 December 2025"},"absolute_dates_time":{"created":"Posted on 24 October 2025 9:50 am","modified":"Updated on 11 December 2025 3:48 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=22621"}],"version-history":[{"count":4,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22621\/revisions"}],"predecessor-version":[{"id":22891,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22621\/revisions\/22891"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22295"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=22621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=22621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=22621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}