{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T05:24:06Z","timestamp":1776317046364,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031442445","type":"print"},{"value":"9783031442452","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44245-2_7","type":"book-chapter","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T15:02:30Z","timestamp":1698073350000},"page":"114-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Formal Framework to\u00a0Measure the\u00a0Incompleteness of\u00a0Abstract Interpretations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1099-3494","authenticated-orcid":false,"given":"Marco","family":"Campion","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8127-9642","authenticated-orcid":false,"given":"Caterina","family":"Urban","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2761-4347","authenticated-orcid":false,"given":"Mila","family":"Dalla Preda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9582-3960","authenticated-orcid":false,"given":"Roberto","family":"Giacobazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"7_CR1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Metric_space#Premetrics"},{"key":"7_CR2","unstructured":"http:\/\/pop-art.inrialpes.fr\/people\/bjeannet\/bjeannet-forge\/interproc\/index.html"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Arkhangel\u2019Skii, A., Fedorchuk, V.: General Topology I: Basic Concepts and Constructions Dimension Theory, vol. 17. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-61265-7","DOI":"10.1007\/978-3-642-61265-7"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Bruni, R., Giacobazzi, R., Gori, R., Garcia-Contreras, I., Pavlovic, D.: Abstract extensionality: on the properties of incomplete abstract interpretations. Proc. ACM Program. Lang. 4(POPL), 28:1\u201328:28 (2020). https:\/\/doi.org\/10.1145\/3371096","DOI":"10.1145\/3371096"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Bruni, R., Giacobazzi, R., Gori, R., Ranzato, F.: A logic for locally complete abstract interpretations. In: 36th Annual ACM\/IEEE Symposium on Logic in Computer Science, LICS 2021, Rome, Italy, June 29\u20132 July 2021, pp. 1\u201313. IEEE (2021). https:\/\/doi.org\/10.1109\/LICS52264.2021.9470608","DOI":"10.1109\/LICS52264.2021.9470608"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Bruni, R., Giacobazzi, R., Gori, R., Ranzato, F.: Abstract interpretation repair. In: Jhala, R., Dillig, I. (eds.) PLDI \u201922: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, 13\u201317 June 2022, pp. 426\u2013441. ACM (2022). https:\/\/doi.org\/10.1145\/3519939.3523453","DOI":"10.1145\/3519939.3523453"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Bruni, R., Giacobazzi, R., Gori, R., Ranzato, F.: A correctness and incorrectness program logic. J. ACM 70(2), 15:1\u201315:45 (2023). https:\/\/doi.org\/10.1145\/3582267","DOI":"10.1145\/3582267"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Buldygin, V.V., Kozachenko, I.V.: Metric Characterization of Random Variables and Random Processes, vol. 188. American Mathematical Society, Providence (2000). https:\/\/doi.org\/10.1090\/mmono\/188","DOI":"10.1090\/mmono\/188"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-32304-2_7","volume-title":"Static Analysis","author":"M Campion","year":"2019","unstructured":"Campion, M., Dalla Preda, M., Giacobazzi, R.: Abstract interpretation of indexed grammars. In: Chang, B.-Y.E. (ed.) SAS 2019. LNCS, vol. 11822, pp. 121\u2013139. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32304-2_7"},{"key":"7_CR10","unstructured":"Campion, M., Dalla Preda, M., Giacobazzi, R.: On the properties of partial completeness in abstract interpretation. In: Lago, U.D., Gorla, D. (eds.) Proceedings of the 23rd Italian Conference on Theoretical Computer Science, ICTCS 2022, Rome, Italy, 7-9 September 2022. CEUR Workshop Proceedings, vol.\u00a03284, pp. 79\u201385. CEUR-WS.org (2022). http:\/\/ceur-ws.org\/Vol-3284\/8665.pdf"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Campion, M., Dalla Preda, M., Giacobazzi, R.: Partial (in)completeness in abstract interpretation: limiting the imprecision in program analysis. Proc. ACM Program. Lang. 6(POPL), 1\u201331 (2022). https:\/\/doi.org\/10.1145\/3498721","DOI":"10.1145\/3498721"},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s11416-021-00377-z","volume":"17","author":"M Campion","year":"2021","unstructured":"Campion, M., Dalla\u00a0Preda, M., Giacobazzi, R.: Learning metamorphic malware signatures from samples. J. Comput. Virol. Hacking Tech. 17(3), 167\u2013183 (2021). https:\/\/doi.org\/10.1007\/s11416-021-00377-z","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-030-45260-5_4","volume-title":"Logic-Based Program Synthesis and Transformation","author":"I Casso","year":"2020","unstructured":"Casso, I., Morales, J.F., L\u00f3pez-Garc\u00eda, P., Giacobazzi, R., Hermenegildo, M.V.: Computing abstract distances in logic programs. In: Gabbrielli, M. (ed.) LOPSTR 2019. LNCS, vol. 12042, pp. 57\u201372. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45260-5_4"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s10664-018-9625-6","volume":"24","author":"M Ceccato","year":"2018","unstructured":"Ceccato, M., et al.: Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1), 240\u2013286 (2018). https:\/\/doi.org\/10.1007\/s10664-018-9625-6","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1145\/322139.322141","volume":"26","author":"J Cohen","year":"1979","unstructured":"Cohen, J., Hickey, T.J.: Two algorithms for determining volumes of convex polyhedra. J. ACM 26(3), 401\u2013414 (1979). https:\/\/doi.org\/10.1145\/322139.322141","journal-title":"J. ACM"},{"key":"7_CR16","unstructured":"Collberg, C., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional, Boston (2009)"},{"issue":"6","key":"7_CR17","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIS.2011.106","volume":"26","author":"CS Collberg","year":"2011","unstructured":"Collberg, C.S., Davidson, J.W., Giacobazzi, R., Gu, Y.X., Herzberg, A., Wang, F.: Toward digital asset protection. IEEE Intell. Syst. 26(6), 8\u201313 (2011). https:\/\/doi.org\/10.1109\/MIS.2011.106","journal-title":"IEEE Intell. Syst."},{"key":"7_CR18","volume-title":"Principles of Abstract Interpretation","author":"P Cousot","year":"2021","unstructured":"Cousot, P.: Principles of Abstract Interpretation. The MIT Press, Cambridge, Mass (2021)"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Cousot, P., Cousot, R.: Static determination of dynamic properties of programs. In: Proceedings of the 2nd International Symposium on Programming, pp. 106\u2013130. Dunod, Paris (1976). https:\/\/doi.org\/10.1145\/390019.808314","DOI":"10.1145\/390019.808314"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Graham, R.M., Harrison, M.A., Sethi, R. (eds.) Proceedings of the 4th ACM Symposium on Principles of Programming Languages, Los Angeles, California, USA, January 1977, pp. 238\u2013252. ACM (1977). https:\/\/doi.org\/10.1145\/512950.512973","DOI":"10.1145\/512950.512973"},{"key":"7_CR21","doi-asserted-by":"publisher","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Aho, A.V., Zilles, S.N., Rosen, B.K. (eds.) Proceedings of the 6th ACM Symposium on Principles of Programming Languages, San Antonio, Texas, USA, January 1979, pp. 269\u2013282. ACM Press (1979). https:\/\/doi.org\/10.1145\/567752.567778","DOI":"10.1145\/567752.567778"},{"issue":"4","key":"7_CR22","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/logcom\/2.4.511","volume":"2","author":"P Cousot","year":"1992","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation frameworks. J. Log. Comput. 2(4), 511\u2013547 (1992). https:\/\/doi.org\/10.1093\/logcom\/2.4.511","journal-title":"J. Log. Comput."},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Cousot, P., Giacobazzi, R., Ranzato, F.: A$$^{2}$$i: abstract$$^{2}$$ interpretation. Proc. ACM Program. Lang. 3(POPL), 1\u201331 (2019). https:\/\/doi.org\/10.1145\/3290355","DOI":"10.1145\/3290355"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: Aho, A.V., Zilles, S.N., Szymanski, T.G. (eds.) Conference Record of the Fifth Annual ACM Symposium on Principles of Programming Languages, Tucson, Arizona, USA, January 1978, pp. 84\u201396. ACM Press (1978). https:\/\/doi.org\/10.1145\/512760.512770","DOI":"10.1145\/512760.512770"},{"key":"7_CR25","unstructured":"Crazzolara, F.: Quasi-metric spaces as domains for abstract interpretation. In: Falaschi, M., Navarro, M., Policriti, A. (eds.) 1997 Joint Conference on Declarative Programming, APPIA-GULP-PRODE\u201997, Grado, Italy, 16\u201319 June 1997, pp. 45\u201356 (1997)"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.tcs.2015.02.024","volume":"577","author":"M Dalla Preda","year":"2015","unstructured":"Dalla Preda, M., Giacobazzi, R., Debray, S.K.: Unveiling metamorphism by abstract interpretation of code properties. Theor. Comput. Sci. 577, 74\u201397 (2015). https:\/\/doi.org\/10.1016\/j.tcs.2015.02.024","journal-title":"Theor. Comput. Sci."},{"issue":"8","key":"7_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/3338112","volume":"62","author":"D Distefano","year":"2019","unstructured":"Distefano, D., F\u00e4hndrich, M., Logozzo, F., O\u2019Hearn, P.W.: Scaling static analyses at facebook. Commun. ACM 62(8), 62\u201370 (2019). https:\/\/doi.org\/10.1145\/3338112","journal-title":"Commun. ACM"},{"key":"7_CR28","doi-asserted-by":"publisher","unstructured":"Giacobazzi, R.: Hiding information in completeness holes: new perspectives in code obfuscation and watermarking. In: Cerone, A., Gruner, S. (eds.) Sixth IEEE International Conference on Software Engineering and Formal Methods, SEFM 2008, Cape Town, South Africa, 10\u201314 November 2008, pp. 7\u201318. IEEE Computer Society (2008). https:\/\/doi.org\/10.1109\/SEFM.2008.41","DOI":"10.1109\/SEFM.2008.41"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Giacobazzi, R., Logozzo, F., Ranzato, F.: Analyzing program analyses. In: Rajamani, S.K., Walker, D. (eds.) Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, 15\u201317 January 2015, pp. 261\u2013273. ACM (2015). https:\/\/doi.org\/10.1145\/2676726.2676987","DOI":"10.1145\/2676726.2676987"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-33125-1_11","volume-title":"Static Analysis","author":"R Giacobazzi","year":"2012","unstructured":"Giacobazzi, R., Mastroeni, I.: Making abstract interpretation incomplete: modeling the potency of obfuscation. In: Min\u00e9, A., Schmidt, D. (eds.) SAS 2012. LNCS, vol. 7460, pp. 129\u2013145. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33125-1_11"},{"issue":"1","key":"7_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00165-016-0374-2","volume":"29","author":"R Giacobazzi","year":"2016","unstructured":"Giacobazzi, R., Mastroeni, I., Dalla Preda, M.: Maximal incompleteness as obfuscation potency. Form. Aspects Comput. 29(1), 3\u201331 (2016). https:\/\/doi.org\/10.1007\/s00165-016-0374-2","journal-title":"Form. Aspects Comput."},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/3-540-47764-0_20","volume-title":"Static Analysis","author":"R Giacobazzi","year":"2001","unstructured":"Giacobazzi, R., Quintarelli, E.: Incompleteness, counterexamples, and refinements in abstract model-checking. In: Cousot, P. (ed.) SAS 2001. LNCS, vol. 2126, pp. 356\u2013373. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-47764-0_20"},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/333979.333989","volume":"47","author":"R Giacobazzi","year":"2000","unstructured":"Giacobazzi, R., Ranzato, F., Scozzari, F.: Making abstract interpretations complete. J. ACM 47(2), 361\u2013416 (2000). https:\/\/doi.org\/10.1145\/333979.333989","journal-title":"J. ACM"},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Helemskii, A.Y.: Lectures and Exercises on Functional Analysis, vol. 233. American Mathematical Society, Providence (2006). https:\/\/doi.org\/10.1090\/mmono\/233","DOI":"10.1090\/mmono\/233"},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"Lawrence, J.: Polytope volume computation. Math. Comput. 57(195), 259\u2013271 (1991). https:\/\/doi.org\/10.1090\/S0025-5718-1991-1079024-2","DOI":"10.1090\/S0025-5718-1991-1079024-2"},{"key":"7_CR36","unstructured":"Logozzo, F.: Towards a quantitative estimation of abstract interpretations. In: Workshop on Quantitative Analysis of Software. Microsoft, June 2009. https:\/\/www.microsoft.com\/en-us\/research\/publication\/towards-a-quantitative-estimation-of-abstract-interpretations\/"},{"key":"7_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/3-540-44978-7_10","volume-title":"Programs as Data Objects","author":"A Min\u00e9","year":"2001","unstructured":"Min\u00e9, A.: A new numerical abstract domain based on difference-bound matrices. In: Danvy, O., Filinski, A. (eds.) PADO 2001. LNCS, vol. 2053, pp. 155\u2013172. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44978-7_10"},{"key":"7_CR38","doi-asserted-by":"publisher","unstructured":"Min\u00e9, A.: The octagon abstract domain. In: Burd, E., Aiken, P., Koschke, R. (eds.) Proceedings of the Eighth Working Conference on Reverse Engineering, WCRE\u201901, Stuttgart, Germany, 2\u20135 October 2001, p. 310. IEEE Computer Society (2001). https:\/\/doi.org\/10.1109\/WCRE.2001.957836","DOI":"10.1109\/WCRE.2001.957836"},{"issue":"3\u20134","key":"7_CR39","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1561\/2500000034","volume":"4","author":"A Min\u00e9","year":"2017","unstructured":"Min\u00e9, A.: Tutorial on static inference of numeric invariants by abstract interpretation. Found. Trends Program. Lang. 4(3\u20134), 120\u2013372 (2017). https:\/\/doi.org\/10.1561\/2500000034","journal-title":"Found. Trends Program. Lang."},{"key":"7_CR40","doi-asserted-by":"publisher","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), 10\u201314 December 2007, Miami Beach, Florida, USA, pp. 421\u2013430. IEEE Computer Society (2007). https:\/\/doi.org\/10.1109\/ACSAC.2007.21","DOI":"10.1109\/ACSAC.2007.21"},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-45142-0_9","volume-title":"Logic Based Program Synthesis and Transformation","author":"A Di Pierro","year":"2001","unstructured":"Di Pierro, A., Wiklicky, H.: Measuring the precision of abstract interpretations. In: LOPSTR 2000. LNCS, vol. 2042, pp. 147\u2013164. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45142-0_9"},{"key":"7_CR42","unstructured":"Sotin, P.: Quantifying the precision of numerical abstract domains. Technical report. HAL Id: inria-00457324, INRIA (2010). https:\/\/hal.inria.fr\/inria-00457324"},{"issue":"8","key":"7_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4230\/DagRep.9.8.1","volume":"9","author":"BD Sutter","year":"2019","unstructured":"Sutter, B.D., Collberg, C.S., Dalla Preda, M., Wyseur, B.: Software protection decision support and evaluation methodologies (dagstuhl seminar 19331). Dagstuhl Rep. 9(8), 1\u201325 (2019). https:\/\/doi.org\/10.4230\/DagRep.9.8.1","journal-title":"Dagstuhl Rep."},{"key":"7_CR44","doi-asserted-by":"publisher","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, 4\u20136 November 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference), pp. 297\u2013300. IEEE Computer Society (2010). https:\/\/doi.org\/10.1109\/BWCCA.2010.85","DOI":"10.1109\/BWCCA.2010.85"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44245-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T08:14:21Z","timestamp":1707380061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44245-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442445","9783031442452"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44245-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/sas-2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}