{"id":8109,"date":"2022-04-25T20:24:19","date_gmt":"2022-04-25T20:24:19","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=8109"},"modified":"2024-03-07T09:48:43","modified_gmt":"2024-03-07T09:48:43","slug":"ndss-test-of-time-award","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/","title":{"rendered":"NDSS Symposium Test of Time Award"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading purple-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">NDSS Symposium Test of Time Award<\/h1>\n\n\n\n<p>An award that recognizes the most influential papers that have been published in past NDSS Symposia.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group full-width light-gray-bg fixed-in-1110 section-padding section-title-r the-difference is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">Test of Time Award Winner 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss2012\/ndss-2012-programme\/smart-secure-and-minimal-architecture-establishing-dynamic-root-trust\/\">SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust (2012)<\/a><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">Karim El Defrawy (UC Irvine), Aur\u00e9lien Francillon (Institute EURECOM), Daniele Perito (INRIA), Gene Tsudik (UC Irvine)<\/p>\n\n\n\n<p>Presented at NDSS Symposium 2012, SMART is a security architecture for remote attestation \u2014 the secure establishment of a dynamic root of trust in a remote embedded device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Test of Time Award Winner 2022<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss2008\/automated-whitebox-fuzz-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Automated Whitebox Fuzz Testing (2008)<\/strong><\/a><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">Patrice Godefroid (Microsoft, Research), Michael Y. Levin (Microsoft, CSE), and David Molnar (UC Berkley)<\/p>\n\n\n\n<p>Automated Whitebox Fuzz Testing (NDSS 2008) is one of the seminal papers on program testing. The paper was an early demonstration of how to make symbolic execution practical and useful at scale. Building on previous advances in dynamic symbolic execution and in fuzz testing, this paper contributed both deep conceptual and practical insights and showed how to effectively achieve high code coverage when fuzzing real software. These insights were leveraged to create a tool, SAGE, that was used to find many bugs in Microsoft applications that couldn\u2019t be found by previous tools. The paper has been enormously influential both in the design of practical tools and in inspiring follow-up research, as evidenced by its more than 1500 citations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Test of Time Awards Winners 2020<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/ndss2000\/first-step-towards-automated-detection-buffer-overrun-vulnerabilities-paper\/\" target=\"_blank\" rel=\"noreferrer noopener\">A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities (2000)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken (UC Berkley)<\/p>\n\n\n\n<p>This paper introduced the use of static analysis for finding potential buffer overrun vulnerabilities in security-critical C code before it is deployed. It spawned an entire industry of security testing tools and practices. Today, static analysis security testing is a cornerstone technique for automated testing and analysis of program source code to identify and resolve security flaws early in the software development life cycle and is an integral part of modern DevOps environments and AppSec programs. The paper is one of the most highly cited NDSS papers from the period 1995-2010.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/ndss2004\/design-and-implementation-datagram-tls\/\">The Design and Implementation of Datagram TLS (2004)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">Nagendra Modadugu (Stanford University) and Eric Rescorla (RTFM, Inc.)<\/p>\n\n\n\n<p>This paper introduced the Datagram Transport Layer Protocol (DTLS), which is based on and provides equivalent security guarantees as TLS for datagram protocols. DTLS is defined as a Proposed Standard for use with User Datagram Protocol (UDP) as well as a number of other IETF protocols, and it is implemented in and supported by many popular TLS implementations. The IETF is actively updating DTLS and other IETF protocol efforts are looking to leverage it for their own security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/ndss2005\/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity\/\">Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software (2005)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">James Newsome and Dawn Song (Carnegie Mellon University)<\/p>\n\n\n\n<p>This paper introduced dynamic taint analysis, a new approach for the automatic detection, analysis, and signature generation of exploits on commodity software. The technique reliably detects overwrite attacks which cause a sensitive value (such a return addresses, function points, and format strings) to be overwritten with an attacker\u2019s data. It has seen widespread application in many areas, including malware analysis, vulnerability discovery, and test case generation. The paper is the second most highly cited NDSS paper (1759) from the period 1995-2010.<\/p>\n\n\n\n<div class=\"wp-block-columns margin-bottom-40 mb-xs--0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<h2 class=\"wp-block-heading\">Test of Time Awards Winners 2019<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/krawczyk.ps\" target=\"_blank\" rel=\"noreferrer noopener\">SKEME: A Versatile Secure Key Exchange Mechanism for Internet (1996)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">Hugo Krawczyk<\/p>\n\n\n\n<p>SKEME was an integral component of early versions of the Internet Key Exchange (IKE) protocol used with IPsec and is the basis for many of the cryptographic design choices in the current IKEv2 Internet Standard. IPsec and IKE are the de facto Internet standards for protection of IP communications including Virtual Private Networks (VPNs) and are widely deployed in numerous commercial products.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"535\" src=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg\" alt=\"test of time award plaques on a table\" class=\"wp-image-11780\" srcset=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg 800w, https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques-300x201.jpg 300w, https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques-768x514.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/ndss1999\/cryptographic-defense-against-connection-depletion-attacks\/\">Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (1999)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700;text-decoration:none\">Ari Juels and John Brainard (RSA Laboratories)<\/p>\n\n\n\n<p>The paper introduced the use of \u201cclient puzzles\u201d to protect against connection depletion attacks (a form of denial of service) in connection-oriented protocols, such as TCP Syn flooding. The paper led to a number of other efforts to develop different forms of client puzzles and to apply them to various other protocols and systems. The paper is the 6th most highly cited NDSS paper (792) from the period 1995-2009.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong><a href=\"https:\/\/www.ndss-symposium.org\/ndss2003\/virtual-machine-introspection-based-architecture-intrusion-detection\/\">A Virtual Machine Introspection Based Architecture for Intrusion Detection (2003)<\/a><\/strong><\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:700\">Tal Garfinkel and Mendel Rosenblum (Stanford University)<\/p>\n\n\n\n<p>This paper introduced the use of VMI for cybersecurity and opened the floodgates on a tremendous amount of research and derivative tools that took VM technology beyond simple resource multiplexing and leveraged it for intrusion detection, intrusion prevention, forensics, isolation, and other cybersecurity protections. The paper is the most highly cited NDSS paper (1751) from the period 1995-2009.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding padding-top-half section-title-r section-sub h2-margins is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">Test of Time Award Nominations<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p>The NDSS Test of Time (ToT) Award recognizes the most influential papers published in past NDSS Symposia with respect to research and\/or industrial impact on computer and network security.<\/p>\n\n\n\n<p>Each year papers are reviewed by the NDSS Test of Time Award committee for consideration. Papers nominated must be published at least ten years prior to the current conference year. <br><br>Anyone can submit a nomination via email to <a href=\"mailto:ndss@elists.isoc.org\">ndss@elists.isoc.org<\/a>. Nominations may be submitted at any time and are considered by the NDSS ToT committee during the selection period in which they are received. You can check the<a href=\"\/previous-ndss-symposia\/\"> previous NDSS Symposia pages<\/a> for inspiration.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-color has-text-color is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<div class=\"wp-block-cover\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#511e84\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-left has-white-color has-text-color\"><strong>Each nomination must include: <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-white-color has-text-color\">1. The title, the author list, and publication year of the nominated paper <br>2. A 100-word (maximum) nomination statement, describing why the paper deserves the Test of Time Award <br>3. The name, title, affiliation of the nominator, and if appropriate, the relationship of the nominator to the authors.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group full-width fixed-in-1110 blue-bg section-padding padding-bottom-0 page-copyright is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-text-align-center\"><strong>Image copyright:<\/strong> \u00a9 Internet Society<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>NDSS Symposium Test of Time Award An award that recognizes the most influential papers that have been published in past NDSS Symposia. Test of Time Award Winner 2024 SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust (2012) Karim El Defrawy (UC Irvine), Aur\u00e9lien Francillon (Institute EURECOM), Daniele Perito (INRIA), Gene Tsudik &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\">Continued<\/a><\/p>\n","protected":false},"author":237,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-8109","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Test of Time (ToT) Award: Past Influential Papers<\/title>\n<meta name=\"description\" content=\"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Test of Time (ToT) Award: Past Influential Papers\" \/>\n<meta property=\"og:description\" content=\"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-07T09:48:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\",\"name\":\"The Test of Time (ToT) Award: Past Influential Papers\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg\",\"datePublished\":\"2022-04-25T20:24:19+00:00\",\"dateModified\":\"2024-03-07T09:48:43+00:00\",\"description\":\"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg\",\"width\":800,\"height\":535,\"caption\":\"test of time award plaques on a table\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NDSS Symposium Test of Time Award\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Test of Time (ToT) Award: Past Influential Papers","description":"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/","og_locale":"en_US","og_type":"article","og_title":"The Test of Time (ToT) Award: Past Influential Papers","og_description":"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.","og_url":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2024-03-07T09:48:43+00:00","og_image":[{"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/","url":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/","name":"The Test of Time (ToT) Award: Past Influential Papers","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg","datePublished":"2022-04-25T20:24:19+00:00","dateModified":"2024-03-07T09:48:43+00:00","description":"The NDSS Test of Time Award recognizes the most influential papers that have been published in past NDSS Symposia. See previous winners and nominate one today.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#primaryimage","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/test-of-time-award-plaques.jpg","width":800,"height":535,"caption":"test of time award plaques on a table"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss-test-of-time-award\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"NDSS Symposium Test of Time Award"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/strinekatrbovic\/","display_name":"Ivana Trbovic"},"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on 25 April 2022","modified":"Updated on 7 March 2024"},"absolute_dates_time":{"created":"Posted on 25 April 2022 8:24 pm","modified":"Updated on 7 March 2024 9:48 am"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/8109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=8109"}],"version-history":[{"count":0,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/8109\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=8109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=8109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=8109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}