{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:44:11Z","timestamp":1759333451549,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944543"},{"type":"electronic","value":"9783031944550"}],"license":[{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94455-0_2","type":"book-chapter","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T09:23:20Z","timestamp":1756977800000},"page":"28-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ChipFuzzer: Towards Fuzzing Matter-Based IoT Devices for\u00a0Vulnerability Detection"],"prefix":"10.1007","author":[{"given":"Saurabh","family":"Joshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5592-1518","authenticated-orcid":false,"given":"Paria","family":"Shirani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"key":"2_CR1","unstructured":"American Fuzzy Lop plus plus (AFL++). https:\/\/github.com\/AFLplusplus\/AFLplusplus. Accessed 29 June 2024"},{"key":"2_CR2","unstructured":"Certified products search | IoT - CSA-IoT. https:\/\/csa-iot.org\/csa-iot_products\/. Accessed 29 June 2024"},{"key":"2_CR3","unstructured":"Connected home over IP. https:\/\/github.com\/project-chip\/connectedhomeip. Accessed 29 June 2024"},{"key":"2_CR4","unstructured":"Custom mutators | aflplusplus. https:\/\/aflplus.plus\/docs\/custom_mutators\/. Accessed 29 June 2024"},{"key":"2_CR5","unstructured":"FRIDA - a world-class dynamic instrumentation toolkit. https:\/\/frida.re\/. Accessed 29 June 2024"},{"key":"2_CR6","unstructured":"OpenWRT project. https:\/\/openwrt.org\/. Accessed 29 June 2024"},{"key":"2_CR7","unstructured":"QEMU. https:\/\/www.qemu.org\/. Accessed 29 June 2024"},{"key":"2_CR8","unstructured":"Zap. https:\/\/github.com\/project-chip\/zap. Accessed 29 June 2024"},{"key":"2_CR9","unstructured":"Connectivity Standards Alliance: Matter application cluster specification (2023). https:\/\/csa-iot.org\/wp-content\/uploads\/2023\/05\/matter-1-1-application-cluster-specification.pdf. Accessed 29 June 2024"},{"key":"2_CR10","unstructured":"Banafa, A.: Three major challenges facing IoT (2017). https:\/\/iot.ieee.org\/articles-publications\/newsletter\/march-2017\/three-major-challenges-facing-iot.html\/"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Nguyen, M.D., Roychoudhury, A.: Directed greybox fuzzing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2329\u20132344 (2017)","DOI":"10.1145\/3133956.3134020"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: IoTFuzzer: Discovering memory corruptions in IoT through app-based fuzzing. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23159"},{"key":"2_CR13","unstructured":"ClusterFuzz: Coverage guided vs blackbox fuzzing | clusterfuzz. https:\/\/google.github.io\/clusterfuzz\/reference\/coverage-guided-vs-blackbox\/. Accessed 29 June 2024"},{"key":"2_CR14","unstructured":"Conole, A.: Simple fuzzer (2023). https:\/\/github.com\/apconole\/Simple-Fuzzer. Accessed 29 June 2024"},{"key":"2_CR15","unstructured":"CSA: Build with matter: Smart home device solution (2023). https:\/\/csa-iot.org\/all-solutions\/matter"},{"key":"2_CR16","unstructured":"CSA: Matter core specification (2023). https:\/\/csa-iot.org\/wp-content\/uploads\/2023\/05\/22-27349-002_matter-1-1-core-specification.pdf. Accessed 29 June 2024"},{"key":"2_CR17","unstructured":"Davidson, D., Moench, B., Ristenpart, T., Jha, S.: FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution. In: 22nd USENIX Security Symposium (USENIX Security 2013), pp. 463\u2013478 (2013)"},{"key":"2_CR18","unstructured":"Google Home Developers: The device data model (2023). https:\/\/developers.home.google.com\/matter\/primer\/device-data-model. Accessed 29 June 2024"},{"key":"2_CR19","unstructured":"Google Home Developers: Commissioning | matter | google home developers (2024). https:\/\/developers.home.google.com\/matter\/primer\/commissioning. Accessed 29 June 2024"},{"key":"2_CR20","unstructured":"Google Home Developers: The device data model. Matter (2024). https:\/\/developers.home.google.com\/matter\/primer\/device-data-model"},{"key":"2_CR21","unstructured":"Google Home Developers: Interaction model concepts. Matter (2024). https:\/\/developers.home.google.com\/matter\/primer\/interaction-model"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s42400-022-00123-y","volume":"5","author":"M Eisele","year":"2022","unstructured":"Eisele, M., Maugeri, M., Shriwas, R., Huth, C., Bella, G.: Embedded fuzzing: a review of challenges, tools, and solutions. Cybersecurity 5(1), 18 (2022)","journal-title":"Cybersecurity"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Feng, X., et al.: Snipuzz: black-box fuzzing of iot firmware via message snippet inference. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 337\u2013350 (2021)","DOI":"10.1145\/3460120.3484543"},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/JAS.2022.105860","volume":"10","author":"X Feng","year":"2022","unstructured":"Feng, X., Zhu, X., Han, Q.L., Zhou, W., Wen, S., Xiang, Y.: Detecting vulnerability on IoT device firmware: a survey. IEEE\/CAA J. Automatica Sinica 10(1), 25\u201341 (2022)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Fu, L., et al.: CPscan: detecting bugs caused by code pruning in IoT kernels. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 794\u2013810 (2021)","DOI":"10.1145\/3460120.3484738"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Ganesh, V., Leek, T., Rinard, M.: Taint-based directed whitebox fuzzing. In: 2009 IEEE 31st International Conference on Software Engineering, pp. 474\u2013484. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Gao, J., Yang, X., Fu, Y., Jiang, Y., Sun, J.: VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 896\u2013899 (2018)","DOI":"10.1145\/3238147.3240480"},{"key":"2_CR28","unstructured":"GNS3: Dynamips development (2024). https:\/\/github.com\/GNS3\/dynamips. Accessed 29 June 2024"},{"issue":"3","key":"2_CR29","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: SAGE: whitebox fuzzing for security testing. Commun. ACM 55(3), 40\u201344 (2012)","journal-title":"Commun. ACM"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Hadi, M.U., et\u00a0al.: A survey on large language models: applications, challenges, limitations, and practical usage. Authorea Preprints (2023)","DOI":"10.36227\/techrxiv.23589741.v1"},{"key":"2_CR31","unstructured":"Hawkes, B.: Project Zero: Five Years of \u2018Make 0day Hard\u2019 (2019). https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#project-zero-five-years-of-make-day-hard-15900"},{"key":"2_CR32","unstructured":"Hetting, C.: Matter adoption accelerates: More than 750 devices already certified, CSA says. https:\/\/wifinowglobal.com\/news-and-blog\/matter-adoption-accelerates-more-than-750-devices-already-certified-csa-says\/. Accessed 29 June 2024"},{"key":"2_CR33","unstructured":"IKEA: TR\u00c5DFRI LED bulb E26 1100 lumen, smart wireless dimmable\/white spectrum globe (2024). https:\/\/www.ikea.com\/ca\/en\/p\/tradfri-led-bulb-e26-1100-lumen-smart-wireless-dimmable-white-spectrum-globe-10489740\/. Accessed 29 June 2024"},{"key":"2_CR34","unstructured":"Silicon Labs: xG24-RB4186C EFR32xG24 2.4 ghz radio board (2024). https:\/\/www.silabs.com\/development-tools\/wireless\/xg24-rb4186c-efr32xg24-wireless-geckoradio-board. Accessed 29 June 2024"},{"issue":"1","key":"2_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-018-0002-y","volume":"1","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, B., Zhang, C.: Fuzzing: a survey. Cybersecurity 1(1), 1\u201313 (2018). https:\/\/doi.org\/10.1186\/s42400-018-0002-y","journal-title":"Cybersecurity"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Liu, B., Shi, L., Cai, Z., Li, M.: Software vulnerability discovery techniques a survey. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, pp. 152\u2013156. IEEE (2012)","DOI":"10.1109\/MINES.2012.202"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Labrador: response guided directed fuzzing for black-box IoT devices. In: 2024 IEEE Symposium on Security and Privacy (SP), p. 127. IEEE Computer Society (2024)","DOI":"10.1109\/SP54263.2024.00127"},{"key":"2_CR38","volume-title":"The Holy Grail: Cisco iOS Shellcode and Exploitation Techniques","author":"M Lynn","year":"2005","unstructured":"Lynn, M.: The Holy Grail: Cisco iOS Shellcode and Exploitation Techniques. Black Hat USA, Las Vegas (2005)"},{"key":"2_CR39","unstructured":"Ma, X., Luo, L., Zeng, Q.: From one thousand pages of specification to unveiling hidden bugs: large language model assisted fuzzing of matter IoT devices. In: 33rd USENIX Security Symposium (USENIX Security 2024), pp. 4783\u20134800 (2024)"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Ma, X., Zeng, Q., Chi, H., Luo, L.: No more companion apps hacking but one dongle: hub-based blackbox fuzzing of IoT firmware. In: Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, pp. 205\u2013218 (2023)","DOI":"10.1145\/3581791.3596857"},{"issue":"11","key":"2_CR41","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.1109\/TSE.2019.2946563","volume":"47","author":"VJ Man\u00e8s","year":"2019","unstructured":"Man\u00e8s, V.J., et al.: The art, science, and engineering of fuzzing: a survey. IEEE Trans. Software Eng. 47(11), 2312\u20132331 (2019)","journal-title":"IEEE Trans. Software Eng."},{"key":"2_CR42","unstructured":"Miller, C., Peterson, Z.N., et\u00a0al.: Analysis of mutation and generation-based fuzzing. Independent Security Evaluators, Technical report 4 (2007)"},{"key":"2_CR43","unstructured":"The MITRE\u00a0Corporation: US-CERT: The MITRE Corporation: Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/. Accessed 29 June 2024"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., Balzarotti, D.: What you corrupt is not what you crash: challenges in fuzzing embedded devices. In: Network and Distributed Systems Security Symposium (NDSS) (2018)","DOI":"10.14722\/ndss.2018.23166"},{"key":"2_CR45","unstructured":"Muniz, S., Ortega, A.: Fuzzing and debugging cisco iOS. BlackHat Europe (2011)"},{"key":"2_CR46","unstructured":"Nanoleaf: Nanoleaf matter essentials smart bulbs | LED color changing lighting (2024). https:\/\/nanoleaf.me\/en-CA\/products\/essentials\/bulbs\/. Accessed 29 June 2024"},{"issue":"3","key":"2_CR47","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N.: Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutor. 21(3), 2702\u20132733 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2_CR48","unstructured":"Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: NDSS, vol.\u00a05, pp.\u00a03\u20134. Citeseer (2005)"},{"key":"2_CR49","unstructured":"OpenRCE: Sulley fuzzing framework (2024). https:\/\/github.com\/OpenRCE\/sulley. Accessed 29 June 2024"},{"key":"2_CR50","unstructured":"OpenThread: Openthread border router (2024). https:\/\/openthread.io\/guides\/border-router. Accessed 29 June 2024"},{"key":"2_CR51","unstructured":"OpenThread: Openthread co-processor (2024). https:\/\/openthread.io\/platforms\/co-processor. Accessed 29 June 2024"},{"key":"2_CR52","unstructured":"Pereyda, J.T.: Boofuzz (2023). https:\/\/boofuzz.readthedocs.io\/en\/stable. Accessed 29 June 2024"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"Pham, V.T., B\u00f6hme, M., Roychoudhury, A.: AFLNet: a greybox fuzzer for network protocols. In: 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), pp. 460\u2013465. IEEE (2020)","DOI":"10.1109\/ICST46399.2020.00062"},{"issue":"9","key":"2_CR54","first-page":"1980","volume":"47","author":"VT Pham","year":"2019","unstructured":"Pham, V.T., B\u00f6hme, M., Santosa, A.E., C\u0103ciulescu, A.R., Roychoudhury, A.: Smart greybox fuzzing. IEEE Trans. Software Eng. 47(9), 1980\u20131997 (2019)","journal-title":"IEEE Trans. Software Eng."},{"key":"2_CR55","unstructured":"Philips: Philips hue bridge (2024). https:\/\/www.philips-hue.com\/en-us\/p\/hue-bridge\/046677458478. Accessed 29 June 2024"},{"issue":"2","key":"2_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3432893","volume":"54","author":"A Qasem","year":"2021","unstructured":"Qasem, A., Shirani, P., Debbabi, M., Wang, L., Lebel, B., Agba, B.L.: Automatic vulnerability detection in embedded devices and firmware: survey and layered taxonomies. ACM Comput. Surv. (CSUR) 54(2), 1\u201342 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Redini, N., et al.: DIANE: identifying fuzzing triggers in apps to generate under-constrained inputs for IoT devices. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 484\u2013500. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00066"},{"key":"2_CR58","unstructured":"Matter SDK: Working with the chip tool (2024). https:\/\/developer.nordicsemi.com\/nRF_Connect_SDK\/doc\/latest\/matter\/chip_tool_guide.html. Accessed 29 June 2024"},{"key":"2_CR59","unstructured":"Nordic Semiconductor: Matter architecture (2023). https:\/\/developer.nordicsemi.com\/nRF_Connect_SDK\/doc\/latest\/nrf\/protocols\/matter\/overview\/architecture.html. Accessed 29 June 2024"},{"key":"2_CR60","unstructured":"Nordic Semiconductor: Matter data model and device types. nRF Connect SDK 2.5.99 documentation (2023). https:\/\/developer.nordicsemi.com\/nRF_Connect_SDK\/doc\/latest\/nrf\/protocols\/matter\/overview\/data_model.html"},{"key":"2_CR61","unstructured":"Nordic Semiconductor: nRF52840 DK development kit (2024). https:\/\/www.nordicsemi.com\/Products\/Development-hardware\/nRF52840-DK. Accessed 29 June 2024"},{"key":"2_CR62","unstructured":"Nordic Semiconductor: nRF52840 dongle (2024). https:\/\/www.nordicsemi.com\/Products\/Development-hardware\/nRF52840-Dongle. Accessed 29 June 2024"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Song, D., et al.: Periscope: an effective probing and fuzzing framework for the hardware-OS boundary. In: 2019 Network and Distributed Systems Security Symposium (NDSS), pp. 1\u201315. Internet Society (2019)","DOI":"10.14722\/ndss.2019.23176"},{"key":"2_CR64","doi-asserted-by":"crossref","unstructured":"Sun, X., et al.: VecSeeds: generate fuzzing testcases from latent vectors based on VAE-GAN. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 953\u2013958. IEEE (2022)","DOI":"10.1109\/TrustCom56396.2022.00131"},{"key":"2_CR65","unstructured":"Synopsys: Fuzz Testing. https:\/\/www.synopsys.com\/glossary\/what-is-fuzz-testing.html"},{"key":"2_CR66","unstructured":"Tasmota: Matter internals (2024). https:\/\/tasmota.github.io\/docs\/Matter-Internals\/. Accessed 29 June 2024"},{"key":"2_CR67","unstructured":"TP-Link: Archer ax73 ax5400 dual-band gigabit Wi-Fi 6 router (2024). https:\/\/www.tp-link.com\/in\/home-networking\/wifi-router\/archer-ax73\/. Accessed 29 June 2024"},{"key":"2_CR68","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhang, Y., Liu, Q.: RPFuzzer: a framework for discovering router protocols vulnerabilities based on fuzzing. KSII Trans. Internet Inf. Syst. 7(8) (2013)","DOI":"10.3837\/tiis.2013.08.014"},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"Yu, B., Wang, P., Yue, T., Tang, Y.: Poster: fuzzing IoT firmware via multi-stage message generation. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2525\u20132527 (2019)","DOI":"10.1145\/3319535.3363247"},{"issue":"21","key":"2_CR70","doi-asserted-by":"publisher","first-page":"21607","DOI":"10.1109\/JIOT.2022.3183952","volume":"9","author":"Z Yu","year":"2022","unstructured":"Yu, Z., Wang, H., Wang, D., Li, Z., Song, H.: CGFuzzer: a fuzzing approach based on coverage-guided generative adversarial networks for industrial IoT protocols. IEEE Internet Things J. 9(21), 21607\u201321619 (2022)","journal-title":"IEEE Internet Things J."},{"key":"2_CR71","unstructured":"Zalewski, M.: American fuzzy lop: a security-oriented fuzzer (2010). http:\/\/lcamtuf.coredump.cx\/afl\/"},{"issue":"1","key":"2_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00091-9","volume":"4","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., et al.: ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. Cybersecurity 4(1), 1\u201322 (2021)","journal-title":"Cybersecurity"},{"key":"2_CR73","unstructured":"Zhao, W.X., et\u00a0al.: A survey of large language models. arXiv preprint arXiv:2303.18223 (2023)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94455-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T22:14:22Z","timestamp":1759270462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94455-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,5]]},"ISBN":["9783031944543","9783031944550"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94455-0_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,5]]},"assertion":[{"value":"5 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}