{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:35:23Z","timestamp":1760229323361,"version":"build-2065373602"},"reference-count":60,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T00:00:00Z","timestamp":1654646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Danish Industry Foundation","award":["2018-0197","952697"],"award-info":[{"award-number":["2018-0197","952697"]}]},{"name":"European Union","award":["2018-0197","952697"],"award-info":[{"award-number":["2018-0197","952697"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Remote attestation (RA) is an effective malware detection mechanism that allows a trusted entity (Verifier) to detect a potentially compromised remote device (Prover). The recent research works are proposing advanced Control-Flow Attestation (CFA) protocols that are able to trace the Prover\u2019s execution flow to detect runtime attacks. Nevertheless, several memory regions remain unattested, leaving the Prover vulnerable to data memory and mobile adversaries. Multi-service devices, whose integrity is also dependent on the integrity of any attached external peripheral devices, are particularly vulnerable to such attacks. This paper extends the state-of-the-art RA schemes by presenting ERAMO, a protocol that attests larger memory regions by adopting the memory offloading approach. We validate and evaluate ERAMO with a hardware proof-of-concept implementation using a TrustZone-capable LPC55S69 running two sensor nodes. We enhance the protocol by providing extensive memory analysis insights for multi-service devices, demonstrating that it is possible to analyze and attest the memory of the attached peripherals. Experiments confirm the feasibility and effectiveness of ERAMO in attesting dynamic memory regions.<\/jats:p>","DOI":"10.3390\/s22124340","type":"journal-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T02:01:44Z","timestamp":1655085704000},"page":"4340","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Memory Offloading for Remote Attestation of Multi-Service IoT Devices"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4974-9739","authenticated-orcid":false,"given":"Edlira","family":"Dushku","sequence":"first","affiliation":[{"name":"DTU Compute, Technical University of Denmark (DTU), 2800 Kgs. Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0441-4644","authenticated-orcid":false,"given":"Jeppe Hagelskj\u00e6r","family":"\u00d8stergaard","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark (DTU), 2800 Kgs. Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark (DTU), 2800 Kgs. Lyngby, Denmark"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"ref_1","unstructured":"(2022, April 30). STMicroelectronics. Available online: https:\/\/www.st.com\/content\/st_com\/en.html."},{"key":"ref_2","unstructured":"(2022, April 30). Arduino. Available online: https:\/\/www.arduino.cc\/."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ciancarini, P., Litvinov, S., Messina, A., Sillitti, A., and Succi, G. (2018, January 7\u20138). The Internet of Hackable Things. Proceedings of the 5th the International Conference in Software Engineering for Defence Applications, Rome, Italy.","DOI":"10.1007\/978-3-319-70578-1"},{"key":"ref_4","unstructured":"Shacham, H. (October, January 2). The Geometry of Innocent Flesh on the Bone: Return-into-Libc without Function Calls (on the X86). Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Ekberg, J., Nyman, T., Paverd, A., Sadeghi, A., and Tsudik, G. (2016, January 24\u201328). C-FLAT: Control-FLow ATtestation for Embedded Systems Software. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria.","DOI":"10.1145\/2976749.2978358"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dessouky, G., Zeitouni, S., Nyman, T., Paverd, A., Davi, L., Koeberl, P., Asokan, N., and Sadeghi, A. (2017, January 18\u201322). LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. Proceedings of the 54th Annual Design Automation Conference (DAC), Austin, TX, USA.","DOI":"10.1145\/3061639.3062276"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zeitouni, S., Dessouky, G., Arias, O., Sullivan, D., Ibrahim, A., Jin, Y., and Sadeghi, A.R. (2017, January 13\u201316). ATRIUM: Runtime attestation resilient under memory attacks. Proceedings of the 2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, USA.","DOI":"10.1109\/ICCAD.2017.8203803"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hu, H., Shinde, S., Adrian, S., Chua, Z.L., Saxena, P., and Liang, Z. (2016, January 22\u201326). Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2016.62"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Carpent, X., Rattanavipanon, N., and Tsudik, G. (May, January 30). Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, DC, USA.","DOI":"10.1109\/HST.2018.8383885"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Carpent, X., Tsudik, G., and Rattanavipanon, N. (2018, January 19\u201323). ERASMUS: Efficient remote attestation via self-measurement for unattended settings. Proceedings of the 2018 Design, Automation Test in Europe Conference Exhibition (DATE), Dresden, Germany.","DOI":"10.23919\/DATE.2018.8342195"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"150936","DOI":"10.1109\/ACCESS.2019.2947652","article-title":"Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog","volume":"7","author":"Tange","year":"2019","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"\u00d8stergaard, J.H., Dushku, E., and Dragoni, N. (2021, January 26\u201328). ERAMO: Effective Remote Attestation through Memory Offloading. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527978"},{"key":"ref_13","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., and Khosla, P. (2004, January 12). SWATT: SoftWare-based attestation for embedded devices. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1095809.1095812","article-title":"Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems","volume":"39","author":"Seshadri","year":"2005","journal-title":"Oper. Syst. Rev."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., and Soriente, C. (2009, January 9\u201313). On the Difficulty of Software-Based Attestation of Embedded Devices. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653711"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ankerg\u00e5rd, S.F.J.J., Dushku, E., and Dragoni, N. (2021). State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things. Sensors, 21.","DOI":"10.3390\/s21051598"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., and Zhang, X. (July, January 29). Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. Proceedings of the 2009 IEEE\/IFIP International Conference on Dependable Systems Networks, Lisbon, Portugal.","DOI":"10.1109\/DSN.2009.5270348"},{"key":"ref_18","unstructured":"Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004, January 9\u201313). Design and Implementation of a TCG-based Integrity Measurement Architecture. Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA."},{"key":"ref_19","unstructured":"Eldefrawy, K., Perito, D., and Tsudik, G. (2012, January 5\u20138). SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust. Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Schulz, S., Varadharajan, V., and Sadeghi, A. (2014, January 14\u201316). TrustLite: A Security Architecture for Tiny Embedded Devices. Proceedings of the Ninth European Conference on Computer Systems (EuroSys), Amsterdam, The Netherlands.","DOI":"10.1145\/2592798.2592824"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Brasser, F., El Mahjoub, B., Sadeghi, A., Wachsmann, C., and Koeberl, P. (2015, January 7\u201311). TyTAN: Tiny trust anchor for tiny devices. Proceedings of the 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), San Francisco, CA, USA.","DOI":"10.1145\/2744769.2744922"},{"key":"ref_22","unstructured":"Asokan, N., Brasser, F., Ibrahim, A., Sadeghi, A., Schunter, M., Tsudik, G., and Wachsmann, C. (2015, January 12\u201316). SEDA: Scalable Embedded Device Attestation. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, CO, USA."},{"key":"ref_23","unstructured":"Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.R., and Schunter, M. (2016, January 24\u201328). SANA: Secure and Scalable Aggregate Network Attestation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security CCS \u201916, Vienna, Austria."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"10240","DOI":"10.1109\/JIOT.2019.2936988","article-title":"SHeLA: Scalable Heterogeneous Layered Attestation","volume":"6","author":"Rabbani","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Lazzeretti, R., Rabbani, M.M., and Ranise, S. (2017, January 18\u201320). Toward Secure and Efficient Attestation for Highly Dynamic Swarms: Poster. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA.","DOI":"10.1145\/3098243.3106026"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Lazzeretti, R., Rabbani, M.M., and Ranise, S. (2018, January 6). PADS: Practical Attestation for Highly Dynamic Swarm Topologies. Proceedings of the 2018 International Workshop on Secure Internet of Things (SIoT), Barcelona, Spain.","DOI":"10.1109\/SIoT.2018.00009"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ankerg\u00e5rd, S.F.J.J., and Dragoni, N. (2021, January 7\u201310). PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain. Proceedings of the 14th International Symposium on Foundations & Practice of Security, Paris, France.","DOI":"10.1007\/978-3-031-08147-7_15"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Dessouky, G., Abera, T., Ibrahim, A., and Sadeghi, A.R. (2018, January 5\u20138). LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution. Proceedings of the International Conference on Computer-Aided Design, San Diego, CA, USA.","DOI":"10.1145\/3240765.3240821"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Samarati, P., Ray, I., and Ray, I. (2018). Distributed Services Attestation in IoT. From Database to Cyber Security, Lecture Notes in Computer Science; Springer International Publishing.","DOI":"10.1007\/978-3-030-04834-1"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Abera, T., Bahmani, R., Brasser, F., Ibrahim, A., Sadeghi, A., and Schunter, M. (2019, January 24\u201327). DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System. Proceedings of the 26th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23420"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Conti, M., Dushku, E., and Mancini, L.V. (2019, January 10\u201313). RADIS: Remote Attestation of Distributed IoT Services. Proceedings of the 6th IEEE International Conference on Software Defined Systems (SDS 2019), Rome, Italy.","DOI":"10.1109\/SDS.2019.8768670"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Rabbani, M.M., Dushku, E., Vliegen, J., Braeken, A., Dragoni, N., and Mentens, N. (2021, January 15\u201317). RESERVE: Remote Attestation of Intermittent IoT Devices. Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal.","DOI":"10.1145\/3485730.3493364"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3123","DOI":"10.1109\/TIFS.2020.2983282","article-title":"SARA: Secure Asynchronous Remote Attestation for IoT Systems","volume":"15","author":"Dushku","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"144880","DOI":"10.1109\/ACCESS.2021.3122391","article-title":"ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services","volume":"9","author":"Dushku","year":"2021","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Chun, B., Ihm, S., Maniatis, P., Naik, M., and Patti, A. (2011, January 10\u201313). CloneCloud: Elastic Execution between Mobile Device and Cloud. European Conference on Computer Systems. Proceedings of the Sixth European conference on Computer systems (EuroSys \u201911), Salzburg, Austria.","DOI":"10.1145\/1966445.1966473"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Conti, M., Dushku, E., Mancini, L.V., Rabbani, M., and Ranise, S. (2019, January 22\u201325). Remote Attestation as a Service for IoT. Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security, Granada, Spain.","DOI":"10.1109\/IOTSMS48152.2019.8939224"},{"key":"ref_37","unstructured":"(2022, April 30). The Volatility Foundation. Available online: https:\/\/www.volatilityfoundation.org\/."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3291047","article-title":"Demystifying Arm TrustZone: A Comprehensive Survey","volume":"51","author":"Pinto","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., and Winandy, M. (2010, January 4\u20138). Return-oriented programming without returns. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866370"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., and Liang, Z. (2011, January 22\u201324). Jump-oriented programming: A new class of code-reuse attack. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China.","DOI":"10.1145\/1966913.1966919"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2677046.2677052","article-title":"Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing","volume":"44","author":"Vaquero","year":"2014","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_42","unstructured":"OpenFog Consortium Architecture Working Group (2022, May 24). OpenFog Reference Architecture for Fog Computing. Available online: https:\/\/www.iiconsortium.org\/pdf\/OpenFog_Reference_Architecture_2_09_17.pdf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","article-title":"Fog and IoT: An Overview of Research Opportunities","volume":"3","author":"Chiang","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_44","unstructured":"(2022, May 24). Azure IoT Edge Documentation. Available online: https:\/\/docs.microsoft.com\/en-us\/azure\/iot-edge\/."},{"key":"ref_45","unstructured":"(2022, May 24). AWS IoT Greengrass. Available online: https:\/\/aws.amazon.com\/greengrass\/."},{"key":"ref_46","unstructured":"(2022, May 24). EdgeX. Available online: https:\/\/www.edgexfoundry.org\/."},{"key":"ref_47","unstructured":"(2022, April 30). Arm TrustZone Technology. Available online: https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone\/trustzone-for-cortex-m."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ngabonziza, B., Martin, D., Bailey, A., Cho, H., and Martin, S. (2016, January 1\u20133). TrustZone Explained: Architectural Features and Use Cases. Proceedings of the 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, USA.","DOI":"10.1109\/CIC.2016.065"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Cerdeira, D., Santos, N., Fonseca, P., and Pinto, S. (2020, January 18\u201321). SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40000.2020.00061"},{"key":"ref_50","unstructured":"Roth, T. (2022, May 24). TrustZone-M(eh): Breaking ARMv8-M\u2019s Security. Available online: https:\/\/media.ccc.de\/v\/36c3-10859-trustzone-m_eh_breaking_armv8-m_s_security."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Arthur, W., and Challener, D. (2015). A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, Springer.","DOI":"10.1007\/978-1-4302-6584-9"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A.R., and Tsudik, G. (2016, January 5\u20139). Invited\u2014Things, Trouble, Trust: On Building Trust in IoT Systems. Proceedings of the 53rd Annual Design Automation Conference, Austin, TX, USA.","DOI":"10.1145\/2897937.2905020"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2447","DOI":"10.1109\/COMST.2020.3008879","article-title":"Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges","volume":"22","author":"Ambrosin","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_54","unstructured":"(2022, April 30). BME280\u2014Data Sheet, Bosch Sensortec. Available online: https:\/\/ae-bst.resource.bosch.com\/media\/_tech\/media\/datasheets\/BST-BME280-DS002.pdf."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Stevens, M., Bursztein, E., Karpman, P., Albertini, A., and Markov, Y. (2017). The First Collision for Full SHA-1. Advances in Cryptology, Springer International Publishing.","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"ref_56","unstructured":"Leurent, G., and Peyrin, T. (2020, January 12\u201314). SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA."},{"key":"ref_57","unstructured":"(2022, April 29). UM11158, LPCXpresso55S69\/55S28 User Manual. Available online: https:\/\/www.nxp.com\/webapp\/Download?colCode=UM10914."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A., and Zeitouni, S. (2017, January 18\u201320). SeED: SeCure Non-Interactive Attestation for EMbedded DEvices. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Boston, MA, USA.","DOI":"10.1145\/3098243.3098260"},{"key":"ref_59","unstructured":"OP-TEE (2022, May 24). About OP-TEE. Available online: https:\/\/optee.readthedocs.io\/en\/latest\/general\/about.html."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Eldefrawy, K., Carpent, X., Tsudik, G., and Rattanavipanon, N. (2018, January 4). Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS), Incheon, Korea.","DOI":"10.1145\/3196494.3196526"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4340\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:25:54Z","timestamp":1760138754000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,8]]},"references-count":60,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["s22124340"],"URL":"https:\/\/doi.org\/10.3390\/s22124340","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,6,8]]}}}