{"id":"https://openalex.org/W2978995152","doi":"https://doi.org/10.1109/sp40000.2020.00046","title":"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG","display_name":"Pseudorandom Black Swans: Cache Attacks on CTR_DRBG","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W2978995152","doi":"https://doi.org/10.1109/sp40000.2020.00046","mag":"2978995152"},"language":"en","primary_location":{"id":"doi:10.1109/sp40000.2020.00046","is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp40000.2020.00046","pdf_url":"https://ieeexplore.ieee.org/ielx7/9144328/9152199/09152663.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/9144328/9152199/09152663.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061801902","display_name":"Shaanan Cohney","orcid":"https://orcid.org/0000-0002-0890-6590"},"institutions":[{"id":"https://openalex.org/I36788626","display_name":"California University of Pennsylvania","ror":"https://ror.org/01spssf70","country_code":"US","type":"education","lineage":["https://openalex.org/I36788626"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shaanan Cohney","raw_affiliation_strings":["University of Pennsylvania","#N#               * University of Pennsylvania"],"affiliations":[{"raw_affiliation_string":"University of Pennsylvania","institution_ids":["https://openalex.org/I36788626"]},{"raw_affiliation_string":"#N#               * University of Pennsylvania","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043093586","display_name":"Andrew Kwong","orcid":"https://orcid.org/0000-0002-6473-288X"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Kwong","raw_affiliation_strings":["University of Michigan","\u2020University of Michigan"],"affiliations":[{"raw_affiliation_string":"University of Michigan","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"\u2020University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110676786","display_name":"Shahar Paz","orcid":null},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shahar Paz","raw_affiliation_strings":["Tel Aviv University","Tel Aviv University *"],"affiliations":[{"raw_affiliation_string":"Tel Aviv University","institution_ids":["https://openalex.org/I16391192"]},{"raw_affiliation_string":"Tel Aviv University *","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029386182","display_name":"Daniel Genkin","orcid":"https://orcid.org/0000-0003-2720-9288"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Genkin","raw_affiliation_strings":["University of Michigan","\u2020University of Michigan"],"affiliations":[{"raw_affiliation_string":"University of Michigan","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"\u2020University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007301401","display_name":"Nadia Heninger","orcid":"https://orcid.org/0000-0002-7904-7295"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nadia Heninger","raw_affiliation_strings":["University of California, San Diego","University of California\u2014San Diego"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"University of California\u2014San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000713291","display_name":"Eyal Ronen","orcid":"https://orcid.org/0000-0002-6013-7426"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["BE","IL"],"is_corresponding":false,"raw_author_name":"Eyal Ronen","raw_affiliation_strings":["COSIC (KU Leuven), Tel Aviv University","Tel Aviv University,COSIC (KU Leuven)"],"affiliations":[{"raw_affiliation_string":"COSIC (KU Leuven), Tel Aviv University","institution_ids":["https://openalex.org/I16391192","https://openalex.org/I99464096"]},{"raw_affiliation_string":"Tel Aviv University,COSIC (KU Leuven)","institution_ids":["https://openalex.org/I16391192","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056484605","display_name":"Yuval Yarom","orcid":"https://orcid.org/0000-0003-0401-4197"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuval Yarom","raw_affiliation_strings":["Data61, University of Adelaide","University of Adelaide; Data61"],"affiliations":[{"raw_affiliation_string":"Data61, University of Adelaide","institution_ids":["https://openalex.org/I5681781","https://openalex.org/I42894916"]},{"raw_affiliation_string":"University of Adelaide; Data61","institution_ids":["https://openalex.org/I5681781","https://openalex.org/I42894916"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5061801902"],"corresponding_institution_ids":["https://openalex.org/I36788626"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62083306,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2019","issue":null,"first_page":"1241","last_page":"1258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8429778814315796},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8071538209915161},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6557568311691284},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5756788849830627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5413195490837097},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4653853476047516},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.4621736407279968},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.45748960971832275},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4461643099784851},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4458667039871216},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4433038532733917},{"id":"https://openalex.org/keywords/rc4","display_name":"RC4","score":0.41713374853134155},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40599003434181213},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.35427752137184143},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.22658437490463257},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1669488549232483},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0955355167388916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8429778814315796},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8071538209915161},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6557568311691284},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5756788849830627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5413195490837097},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4653853476047516},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.4621736407279968},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.45748960971832275},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4461643099784851},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4458667039871216},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4433038532733917},{"id":"https://openalex.org/C109154458","wikidata":"https://www.wikidata.org/wiki/Q846955","display_name":"RC4","level":4,"score":0.41713374853134155},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40599003434181213},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.35427752137184143},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.22658437490463257},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1669488549232483},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0955355167388916}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/sp40000.2020.00046","is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp40000.2020.00046","pdf_url":"https://ieeexplore.ieee.org/ielx7/9144328/9152199/09152663.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},{"id":"mag:2978995152","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.1109/sp40000.2020.00046","is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp40000.2020.00046","pdf_url":"https://ieeexplore.ieee.org/ielx7/9144328/9152199/09152663.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1423911628","display_name":"CAREER: Cryptographic Security at Internet Scale","funder_award_id":"1651344","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2240291290","display_name":null,"funder_award_id":"23/14","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"},{"id":"https://openalex.org/G4314282881","display_name":null,"funder_award_id":"1523/14","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"},{"id":"https://openalex.org/G4713059963","display_name":null,"funder_award_id":"FA8750","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5921281487","display_name":null,"funder_award_id":"number","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7660149010","display_name":null,"funder_award_id":"CNS-1651344","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2978995152.pdf","grobid_xml":"https://content.openalex.org/works/W2978995152.grobid-xml"},"referenced_works_count":71,"referenced_works":["https://openalex.org/W116480387","https://openalex.org/W156987080","https://openalex.org/W178356831","https://openalex.org/W1496265857","https://openalex.org/W1527529076","https://openalex.org/W1585289785","https://openalex.org/W1623551255","https://openalex.org/W1751997554","https://openalex.org/W1976476866","https://openalex.org/W2001759130","https://openalex.org/W2077667328","https://openalex.org/W2093324650","https://openalex.org/W2103289002","https://openalex.org/W2106075707","https://openalex.org/W2145229476","https://openalex.org/W2150620897","https://openalex.org/W2157116240","https://openalex.org/W2159520802","https://openalex.org/W2170489924","https://openalex.org/W2172060328","https://openalex.org/W2183171747","https://openalex.org/W2412886904","https://openalex.org/W2532945044","https://openalex.org/W2552378946","https://openalex.org/W2559892799","https://openalex.org/W2612789561","https://openalex.org/W2616901112","https://openalex.org/W2620979425","https://openalex.org/W2735733036","https://openalex.org/W2751246305","https://openalex.org/W2753324901","https://openalex.org/W2765255210","https://openalex.org/W2769061097","https://openalex.org/W2888798936","https://openalex.org/W2892082588","https://openalex.org/W2911842201","https://openalex.org/W2915352631","https://openalex.org/W2951084996","https://openalex.org/W2954241526","https://openalex.org/W2963311060","https://openalex.org/W2979371882","https://openalex.org/W2982848142","https://openalex.org/W4230238643","https://openalex.org/W4244887729","https://openalex.org/W4299653080","https://openalex.org/W6604021625","https://openalex.org/W6628261430","https://openalex.org/W6629297748","https://openalex.org/W6633448724","https://openalex.org/W6638489149","https://openalex.org/W6639227227","https://openalex.org/W6679724985","https://openalex.org/W6703549403","https://openalex.org/W6712222632","https://openalex.org/W6712239322","https://openalex.org/W6712785763","https://openalex.org/W6729667700","https://openalex.org/W6732034840","https://openalex.org/W6732215895","https://openalex.org/W6734345789","https://openalex.org/W6735850276","https://openalex.org/W6736329903","https://openalex.org/W6743325655","https://openalex.org/W6743592517","https://openalex.org/W6752303725","https://openalex.org/W6753443810","https://openalex.org/W6753937820","https://openalex.org/W6756740455","https://openalex.org/W6764039412","https://openalex.org/W6769288218","https://openalex.org/W6776033356"],"related_works":["https://openalex.org/W3015844015","https://openalex.org/W2637438143","https://openalex.org/W2990207314","https://openalex.org/W2891653310","https://openalex.org/W2080672785","https://openalex.org/W2949489818","https://openalex.org/W2951473751","https://openalex.org/W2533014015","https://openalex.org/W2950954563","https://openalex.org/W3030182770","https://openalex.org/W2510546925","https://openalex.org/W50107694","https://openalex.org/W1576151945","https://openalex.org/W3014970794","https://openalex.org/W1811921100","https://openalex.org/W3031517489","https://openalex.org/W2752986023","https://openalex.org/W2187377894","https://openalex.org/W2950119048","https://openalex.org/W2808296455"],"abstract_inverted_index":{"Modern":[0],"cryptography":[1],"requires":[2],"the":[3,42,70,73,88,95,162,170,182,187,194,198,201,211,244],"ability":[4],"to":[5,25,36,63,86,135,174,185,196,219,225],"securely":[6],"generate":[7],"pseudorandom":[8,26],"numbers.":[9],"However,":[10],"despite":[11],"decades":[12],"of":[13,22,45,100],"work":[14,32],"on":[15],"side-channel":[16,43,54,120],"attacks,":[17],"there":[18],"is":[19,84],"little":[20],"discussion":[21],"their":[23,115],"application":[24],"number":[27],"generators":[28],"(PRGs).":[29],"In":[30,200],"this":[31,38],"we":[33,123,154,204],"set":[34],"out":[35,156,221],"address":[37],"gap,":[39],"empirically":[40,146],"evaluating":[41],"resistance":[44],"common":[46],"PRG":[47],"implementations.We":[48],"find":[49,124],"that":[50,125,131,160,206],"hard-learned":[51],"lessons":[52],"about":[53],"leakage":[55],"from":[56,143,165,243],"encryption":[57],"primitives":[58],"have":[59,78],"not":[60,77],"been":[61],"applied":[62],"PRGs,":[64],"at":[65],"all":[66],"abstraction":[67],"levels.":[68],"At":[69,94],"design":[71],"level,":[72,97],"NIST-recommended":[74],"CTR_DRBG":[75,101,167],"does":[76],"forward":[79],"security":[80],"if":[81],"an":[82,133,175,207],"attacker":[83,134,195,208],"able":[85],"compromise":[87],"state":[89,164,184,228],"(e.g.,":[90],"via":[91],"a":[92,157,222],"side-channel).":[93],"primitive":[96],"popular":[98],"implementations":[99,127,168],"such":[102],"as":[103,114],"OpenSSL's":[104],"FIPS":[105],"module":[106],"and":[107,139,236],"NetBSD's":[108],"kernel":[109],"use":[110,181],"leaky":[111],"T-table":[112],"AES":[113,231],"underlying":[116],"cipher,":[117],"enabling":[118],"cache":[119,158],"attacks.":[121],"Finally,":[122],"many":[126],"make":[128],"parameter":[129],"choices":[130],"enable":[132],"fully":[136],"exploit":[137,210],"side-channels":[138],"recover":[140,226],"secret":[141],"keys":[142],"TLS":[144,171,241],"connections.We":[145],"demonstrate":[147],"our":[148],"attack":[149,159,224],"in":[150],"two":[151],"scenarios.":[152],"First,":[153],"carry":[155,220],"recovers":[161],"private":[163],"vulnerable":[166],"when":[169],"client":[172],"connects":[173],"attacker-controlled":[176],"server.":[177],"We":[178],"then":[179],"subsequently":[180],"recovered":[183],"compute":[186],"client's":[188],"long-term":[189],"authentication":[190],"keys,":[191],"thereby":[192],"allowing":[193],"impersonate":[197],"client.":[199],"second":[202],"scenario,":[203],"show":[205],"can":[209],"high":[212],"temporal":[213],"resolution":[214],"provided":[215],"by":[216],"Intel":[217],"SGX":[218],"blind":[223],"CTR_DRBG's":[227],"within":[229],"three":[230],"encryptions,":[232],"without":[233],"viewing":[234],"output,":[235],"thus":[237],"decrypt":[238],"passively":[239],"collected":[240],"connections":[242],"victim.":[245]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
