{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:46:23Z","timestamp":1770227183728,"version":"3.49.0"},"publisher-location":"Cham","reference-count":91,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031859595","type":"print"},{"value":"9783031859601","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":65,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The Domain Name System (DNS) is a cornerstone of the Internet. As such, it\u00a0is often the subject or the means of network measurement studies. Over the\u00a0past decades, the Internet measurement community gathered many lessons-learned\u00a0and captured them in widely available measurement toolchains such as ZDNS\u00a0and OpenINTEL as well as many papers. However, for feasibility, these tools\u00a0often restrict DNS tree exploration, use caching, and other intricate methods\u00a0for reducing query load. This potentially hides many corner cases\u00a0and unforeseen problems.<\/jats:p>\n          <jats:p>In this paper, we present a system capable of exploring the full DNS tree. We gather 87 TB of DNS data covering 812M domains with over 85B queries over 40 days. Using this data, we replicate four earlier studies that used feasibility\u00a0and time-optimized DNS datasets. Our results demonstrate the need for care in selecting which limitations regarding the perspective on DNS can be accepted for a given research question and\u00a0which may alter findings and conclusions.<\/jats:p>","DOI":"10.1007\/978-3-031-85960-1_5","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:24:19Z","timestamp":1741245859000},"page":"106-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Tree in\u00a0a\u00a0Tree: Measuring Biases of\u00a0Partial DNS Tree Exploration"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7767-7386","authenticated-orcid":false,"given":"Florian","family":"Steurer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5530-6993","authenticated-orcid":false,"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-5134","authenticated-orcid":false,"given":"Tobias","family":"Fiebig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abley, J., et al.: Operation of anycast services. RFC 4786 (2006)","DOI":"10.17487\/rfc4786"},{"key":"5_CR2","unstructured":"afnic, Donn\u00e9es partag\u00e9es : l\u2019open-data du .fr (2023). https:\/\/www.afnic.fr\/produits-services\/services-associes\/donnees-partagees\/"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Akiwate, G., et al.: Unresolved issues: prevalence, persistence, and perils of lame delegations. In: IMC (2020)","DOI":"10.1145\/3419394.3423623"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Andrews, M., et al.: DNS glue requirements in referral responses. RFC 9471 (2023)","DOI":"10.17487\/RFC9471"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Arends, R., et al.: DNS security introduction and requirements. RFC 4033 (2005)","DOI":"10.17487\/rfc4033"},{"key":"5_CR6","unstructured":"Ashiq, M.I., et al.: You\u2019ve got report: measurement and security implications of DMARC reporting. In: USENIXSEC (2023)"},{"key":"5_CR7","unstructured":"Blechschmidt, B.: MassDNS (2024). http:\/\/github.com\/blechschmidt\/massdns"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Borgolte, K., et al.: Cloud strife: mitigating the security risks of domain-validated certificates. In: ANRW (2018)","DOI":"10.14722\/ndss.2018.23327"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Borgolte, K., et al.: Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones. In: SP (2018)","DOI":"10.1109\/SP.2018.00027"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bortzmeyer, S.: DNS query name minimisation to improve privacy. RFC 7816 (2016)","DOI":"10.17487\/RFC7816"},{"key":"5_CR11","unstructured":"Brownlee, N., et al.: DNS measurements at a Root server. In: GLOBECOM (2001)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Callejo, P., et al.: Measuring the global recursive dns infrastructure: a view from the edge. IEEE Access (2019)","DOI":"10.1109\/ACCESS.2019.2950325"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Chung, T., et al.: Understanding the role of registrars in DNSSEC deployment. In: IMC (2017)","DOI":"10.1145\/3131365.3131373"},{"key":"5_CR14","unstructured":"Cisco, Umbrella List (2023). https:\/\/s3-us-west-1.amazonaws.com\/umbrellastatic\/index.html"},{"key":"5_CR15","unstructured":"CloudFlare, Cloudflare Radar List (2023). https:\/\/radar.cloudflare.com\/"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Czybik, S., et al.: Lazy gatekeepers: a large-scale study on SPF configuration in the wild. In: IMC (2023)","DOI":"10.1145\/3618257.3624827"},{"key":"5_CR17","unstructured":"Darst, C., et al.: Measurement and management of internet services. In: IM (1999)"},{"key":"5_CR18","unstructured":"Deccio, C.: DNSViz (2012). https:\/\/dnsviz.net\/"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Deccio, C., et al.: Measuring availability in the domain name system. In: INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462270"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Dickinson, J., et al.: DNS transport over TCP - implementation requirements. RFC 7766 (2016)","DOI":"10.17487\/RFC7766"},{"key":"5_CR21","unstructured":"DNIB Quarterly Report Q4 2023. https:\/\/dnib.com\/articles\/the-domainname-industry-brief-q4-2023"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Durand, A., et al.: DNS IPv6 transport operational guidelines. RFC 3901 (2004)","DOI":"10.17487\/rfc3901"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Elz, R., et al.: Clarifications to the DNS specification. RFC 2181 (1997)","DOI":"10.17487\/rfc2181"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Fayed, M., et al.: The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale. In: SIGCOMM (2021)","DOI":"10.1145\/3452296.3472922"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Fiebig, T.: Crisis, ethics, reliability & a measurement network. In: ANRW (2023)","DOI":"10.1145\/3606464.3606483"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Fiebig, T., et al.: Something from nothing (there): collecting global ipv6 datasets from DNS. In: PAM (2017)","DOI":"10.1007\/978-3-319-54328-4_3"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Fiebig, T., et al.: In rDNS we trust: revisiting a common data-source\u2019s reliability. In: PAM (2018)","DOI":"10.1007\/978-3-319-76481-8_10"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Fiebig, T., et al.: Heads in the clouds? Measuring universities\u2019 migration to public clouds: implications for privacy & academic freedom. In: PETS (2023)","DOI":"10.56553\/popets-2023-0044"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Fujiwara, K., et al.: Aggressive use of DNSSEC-validated cache. RFC 8198 (2017)","DOI":"10.17487\/RFC8198"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Fukuda, K., et al.: Characterizing DNS query response sizes through active and passive measurements. In: NOMS (2022)","DOI":"10.1109\/NOMS54207.2022.9789912"},{"key":"5_CR31","unstructured":"Gao, H., et al.: Reexamining DNS from a global recursive resolver perspective. TON (2014)"},{"key":"5_CR32","unstructured":"Gieben, M.: MiekgDNS git (2023). https:\/\/github.com\/miekg\/dns"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Gojmerac, I., et al.: Large-scale active measurements of DNS entries related to E-mail system security. In: ICC (2015)","DOI":"10.1109\/ICC.2015.7249513"},{"key":"5_CR34","unstructured":"Grafana Labs, Grafana (2024). https:\/\/grafana.com\/"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Harrenstien, K., et al.: DoD internet host table specification. RFC 952 (1985)","DOI":"10.17487\/rfc0952"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Hoffman, P., et al.: DNS terminology. RFC 8499 (2019)","DOI":"10.17487\/RFC8499"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Hoffman, P., et al.: The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. RFC 6698 (2012)","DOI":"10.17487\/rfc6698"},{"key":"5_CR38","unstructured":"Huitema, C., et al.: Internet measurements: the rising tide and the DNS Snag. In: ITC Specialist Seminar on Internet Traffic Measurement and Modelling (2000)"},{"key":"5_CR39","unstructured":"ICANN, ICANN CZDS (2023). https:\/\/czds.icann.org\/home"},{"key":"5_CR40","unstructured":"Internet Systems Consortium, Can an NS record refer to a CNAME?. https:\/\/kb.isc.org\/docs\/aa-00203"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Izhikevich, L., et al.: ZDNS: a fast DNS toolkit for internet measurement. In: IMC (2022)","DOI":"10.1145\/3517745.3561434"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Kenneally, E., et al.: The Menlo report: ethical principles guiding information and communication technology research. SSRN Electron. J. (2012)","DOI":"10.2139\/ssrn.2445102"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Kosek, M., et al.: Measuring DNS over TCP in the era of increasing DNS response sizes: a view from the edge. ACM SIGCOMM Comput. Commun. Rev. (2022)","DOI":"10.1145\/3544912.3544918"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Kumari, W., et al.: Extended DNS errors. RFC 8914 (2020)","DOI":"10.17487\/RFC8914"},{"key":"5_CR45","unstructured":"Le Pochat, V., et al.: Tranco list (2023). https:\/\/tranco-list.eu\/"},{"key":"5_CR46","unstructured":"Learmonth, I.R., et al.: RFC guidelines for performing safe measurement on the internet. Technical report (2023). https:\/\/datatracker.ietf.org\/doc\/draft-irtfpearg-safe-internet-measurement"},{"key":"5_CR47","unstructured":"Lee, H., et al.: A longitudinal and comprehensive study of the DANE ecosystem in email. In: USENIXSEC (2020)"},{"key":"5_CR48","unstructured":"Lee, H., et al.: Under the hood of DANE mismanagement in SMTP. In: USENIXSEC (2022)"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Liston, R., et al.: Diversity in DNS performance measures. In: SIGCOMM Workshop on Internet Measurement (2002)","DOI":"10.1145\/637202.637204"},{"key":"5_CR50","unstructured":"Liu, C., et al.: DNS and Bind. O\u2019Reilly Media, Inc. (2006)"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Lottor, M.: Domain administrators operations guide. RFC 1033 (1987)","DOI":"10.17487\/rfc1033"},{"key":"5_CR52","unstructured":"Majestic, Majestic List (2023). https:\/\/majestic.com\/reports\/majestic-million"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names - implementation and specification. RFC 1035 (1983)","DOI":"10.17487\/rfc0883"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names: concepts and facilities. RFC 1034 (1987)","DOI":"10.17487\/rfc1034"},{"key":"5_CR55","doi-asserted-by":"crossref","unstructured":"Moura, G.C.M., et al.: Anycast vs. DDoS: evaluating the November 2015 root DNS event. In: IMC (2016)","DOI":"10.1145\/2987443.2987446"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Moura, G.C.M., et al.: Cache me if you can: effects of DNS time-to-live. In: IMC (2019)","DOI":"10.1145\/3355369.3355568"},{"key":"5_CR57","doi-asserted-by":"crossref","unstructured":"Moura, G.C.M., et al.: Fragmentation, truncation, and timeouts: are large DNS messages falling to bits? In: PAM (2021)","DOI":"10.1007\/978-3-030-72582-2_27"},{"key":"5_CR58","unstructured":"Mozilla Foundation, Public Suffix List (2022). https:\/\/publicsuffix.org\/"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Naab, J., et al.: Gotta query \u2019em all, again! Repeatable name resolution with full dependency provenance. In: ANRW (2023)","DOI":"10.1145\/3606464.3606478"},{"key":"5_CR60","unstructured":"sk-nic, sk-nic OpenData (2023). https:\/\/sk-nic.sk\/subory\/domains.txt"},{"key":"5_CR61","unstructured":"NLnet Labs, Unbound (2023). https:\/\/unbound.docs.nlnetlabs.nl"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Nosyk, Y., et al.: Extended DNS errors: unlocking the full potential of DNS troubleshooting. In: IMC (2023)","DOI":"10.1145\/3618257.3624835"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Pappas, V., et al.: Impact of configuration errors on DNS robustness. In: SIGCOMM (2004)","DOI":"10.1145\/1015467.1015503"},{"key":"5_CR64","unstructured":"PowerDNS, DNS Camel (2024). https:\/\/powerdns.org\/dns-camel\/"},{"key":"5_CR65","unstructured":"PowerDNS B.V., Lua Records (2024). https:\/\/doc.powerdns.com\/authoritative\/lua-records\/"},{"key":"5_CR66","doi-asserted-by":"crossref","unstructured":"Ramasubramanian, V., et al.: Perils of transitive trust in the domain name system. In: IMC (2005)","DOI":"10.1145\/1330107.1330152"},{"key":"5_CR67","doi-asserted-by":"crossref","unstructured":"van Rijswijk-Deij, R., et al.: DNSSEC and its potential for DDoS attacks. In: IMC (2014)","DOI":"10.1145\/2663716.2663731"},{"key":"5_CR68","doi-asserted-by":"crossref","unstructured":"van Rijswijk-Deij, R., et al.: A high-performance, scalable infrastructure for large-scale active DNS measurements. JSAC (2016)","DOI":"10.1109\/JSAC.2016.2558918"},{"key":"5_CR69","doi-asserted-by":"crossref","unstructured":"Rosenbaum, R.: Using the domain name system to store arbitrary string attributes. RFC 1464 (1993)","DOI":"10.17487\/rfc1464"},{"key":"5_CR70","doi-asserted-by":"crossref","unstructured":"Scheitle, Q., et al.: A first look at certification authority authorization (CAA). CCR (2018)","DOI":"10.1145\/3213232.3213235"},{"key":"5_CR71","doi-asserted-by":"crossref","unstructured":"Schlyter, J., et al.: Using DNS to securely publish secure shell (SSH) key fingerprints. RFC 4255 (2006)","DOI":"10.17487\/rfc4255"},{"key":"5_CR72","doi-asserted-by":"crossref","unstructured":"Sommese, R., et al.: The forgotten side of DNS: orphan and abandoned records. In: EuroS &P Workshop (2020)","DOI":"10.1109\/EuroSPW51379.2020.00079"},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"Sommese, R., et al.: When parents and children disagree: diving into DNS delegation inconsistency. In: PAM (2020)","DOI":"10.1007\/978-3-030-44081-7_11"},{"key":"5_CR74","doi-asserted-by":"crossref","unstructured":"Sommese, R., et al.: This is a local domain: on amassing country-code top-level domains from public data (2023)","DOI":"10.1145\/3687234.3687236"},{"key":"5_CR75","doi-asserted-by":"crossref","unstructured":"Sperotto, A., et al.: TIDE: threat identification using active DNS measurements. In: SIGCOMM Posters and Demos (2017)","DOI":"10.1145\/3123878.3131988"},{"key":"5_CR76","doi-asserted-by":"crossref","unstructured":"Stahl, M.: Domain administrators guide. RFC 1032 (1987)","DOI":"10.17487\/rfc1032"},{"key":"5_CR77","doi-asserted-by":"crossref","unstructured":"Steurer, F., et al.: A tree in a tree: measuring biases of partial DNS tree exploration, version 1.0 (2024). https:\/\/doi.org\/10.17617\/3.UBPZXP","DOI":"10.1007\/978-3-031-85960-1_5"},{"key":"5_CR78","doi-asserted-by":"crossref","unstructured":"Streibelt, F., et al.: Exploring EDNS-client-subnet adopters in your free time. In: IMC (2013)","DOI":"10.1145\/2504730.2504767"},{"key":"5_CR79","doi-asserted-by":"crossref","unstructured":"Streibelt, F., et al.: How ready is DNS for an IPv6-only world? In: PAM (2023)","DOI":"10.1007\/978-3-031-28486-1_22"},{"key":"5_CR80","unstructured":"The Linux Foundation, Prometheus - Monitoring system & time series database (2024). https:\/\/prometheus.io\/"},{"key":"5_CR81","doi-asserted-by":"crossref","unstructured":"Thompson, K., et al.: Wide-area Internet traffic patterns and characteristics. IEEE Netw. (1997)","DOI":"10.1109\/65.642356"},{"key":"5_CR82","doi-asserted-by":"crossref","unstructured":"van der Toorn, O., et al.: Melting the snow: using active DNS measurements to detect snowshoe spam domains. In: NOMS (2018)","DOI":"10.1109\/NOMS.2018.8406222"},{"key":"5_CR83","doi-asserted-by":"crossref","unstructured":"van der Toorn, O., et al.: Saving Brian\u2019s privacy: the perils of privacy exposure through reverse DNS. In: IMC (2022)","DOI":"10.1145\/3517745.3561424"},{"key":"5_CR84","doi-asserted-by":"crossref","unstructured":"der Toorn, O.V., et al.: TXTing 101: finding security issues in the long tail of DNS TXT records. In: EuroS &PW (2020)","DOI":"10.1109\/EuroSPW51379.2020.00080"},{"key":"5_CR85","doi-asserted-by":"crossref","unstructured":"Vermeer, M., et al.: SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations. In: EuroS &P (2021)","DOI":"10.1109\/EuroSP51992.2021.00037"},{"key":"5_CR86","doi-asserted-by":"crossref","unstructured":"Vissers, T., et al.: The wolf of name street: hijacking domains through their nameservers. In: SIGSAC (2017)","DOI":"10.1145\/3133956.3133988"},{"key":"5_CR87","doi-asserted-by":"crossref","unstructured":"Vixie, P.: A mechanism for prompt notification of zone changes (DNS NOTIFY). RFC (1996)","DOI":"10.17487\/rfc1996"},{"key":"5_CR88","doi-asserted-by":"crossref","unstructured":"de Vries, W.B., et al.: A first look at QNAME minimization in the domain name system. In: PAM (2019)","DOI":"10.1007\/978-3-030-15986-3_10"},{"key":"5_CR89","doi-asserted-by":"crossref","unstructured":"Yajima, M., et al.: Measuring adoption of DNS security mechanisms with cross-sectional approach. In: GLOBECOM (2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685960"},{"key":"5_CR90","doi-asserted-by":"crossref","unstructured":"Zhang, S., et al.: Robust or risky: measurement and analysis of domain resolution dependency. INFOCOM (2024)","DOI":"10.1109\/INFOCOM52122.2024.10621098"},{"key":"5_CR91","unstructured":"Zirngibl, J., et al.: Domain parking: largely present, rarely considered! In: TMA (2022)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85960-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:08:51Z","timestamp":1753884531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85960-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031859595","9783031859601"],"references-count":91,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85960-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 March 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 March 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/udesa.edu.ar\/pam25","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}