{"id":"https://openalex.org/W3096372727","doi":"https://doi.org/10.1145/3372297.3417289","title":"Speculative Probing","display_name":"Speculative Probing","publication_year":2020,"publication_date":"2020-10-30","ids":{"openalex":"https://openalex.org/W3096372727","doi":"https://doi.org/10.1145/3372297.3417289","mag":"3096372727"},"language":"en","primary_location":{"id":"doi:10.1145/3372297.3417289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417289","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004146830","display_name":"Enes G\u00f6kta\u015f","orcid":"https://orcid.org/0009-0000-4988-7229"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Enes G\u00f6ktas","raw_affiliation_strings":["Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082033768","display_name":"Kaveh Razavi","orcid":"https://orcid.org/0000-0002-8588-7100"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Kaveh Razavi","raw_affiliation_strings":["ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045292308","display_name":"Georgios Portokalidis","orcid":"https://orcid.org/0000-0002-1665-803X"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Georgios Portokalidis","raw_affiliation_strings":["Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029566823","display_name":"Herbert Bos","orcid":"https://orcid.org/0000-0001-6179-1510"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Herbert Bos","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083941826","display_name":"Cristiano Giuffrida","orcid":"https://orcid.org/0000-0002-8329-5929"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cristiano Giuffrida","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004146830"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":2.4466,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.91386243,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1871","last_page":"1885"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8232118487358093},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.7218329906463623},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6936817169189453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6092894077301025},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.5523069500923157},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.49247369170188904},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.471684992313385},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4672398865222931},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.4576631188392639},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4053850769996643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8232118487358093},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.7218329906463623},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6936817169189453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6092894077301025},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.5523069500923157},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.49247369170188904},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.471684992313385},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4672398865222931},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.4576631188392639},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4053850769996643}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3372297.3417289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:research.vu.nl:openaire/68495f5f-c4ce-4090-a2e4-ef64e901bbdf","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/68495f5f-c4ce-4090-a2e4-ef64e901bbdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"G\u00f6ktas, E, Razavi, K, Portokalidis, G, Bos, H & Giuffrida, C 2020, Speculative Probing : Hacking Blind in the Spectre Era. in CCS '20 : Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 1871-1885, 27th ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, Virtual, Online, United States, 9/11/20. https://doi.org/10.1145/3372297.3417289","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3372297.3417289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8199999928474426}],"awards":[{"id":"https://openalex.org/G2229678078","display_name":null,"funder_award_id":"639.021.753","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G3461572826","display_name":"A Common Code Base and Toolkit for  Deployment of Applications to Secure and Reliable Virtual Execution Environments","funder_award_id":"825377","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3689039954","display_name":null,"funder_award_id":"N00014-16-1-2261, N00014-17-1-2788","funder_id":"https://openalex.org/F4320338298","funder_display_name":"Office of Naval Research Global"},{"id":"https://openalex.org/G4504108201","display_name":null,"funder_award_id":"N00014-17-1","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4751570384","display_name":null,"funder_award_id":"4-17-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4776870722","display_name":null,"funder_award_id":"unknown","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5036817778","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innov","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5501761068","display_name":null,"funder_award_id":"4-16-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G5584389321","display_name":null,"funder_award_id":"unknown","funder_id":"https://openalex.org/F4320307102","funder_display_name":"Intel Corporation"},{"id":"https://openalex.org/G5586463276","display_name":null,"funder_award_id":"N00014-16-1-2261","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G5643251411","display_name":null,"funder_award_id":"and N00","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G6009445997","display_name":null,"funder_award_id":"unknown","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G6958987416","display_name":"Restoring Trust in the cyber space: a Systems Security Proposal","funder_award_id":"690972","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7010378412","display_name":null,"funder_award_id":"016.Veni","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7497758878","display_name":"How I Learned to Stop Worrying and Love Unreliable Hardware","funder_award_id":"016.Veni.192.262","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7788277423","display_name":"REactively Defending against Advanced Cybersecurity Threats","funder_award_id":"786669","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8633428685","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innovat","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338298","display_name":"Office of Naval Research Global","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3096372727.pdf","grobid_xml":"https://content.openalex.org/works/W3096372727.grobid-xml"},"referenced_works_count":82,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1447175589","https://openalex.org/W1488058190","https://openalex.org/W1495630617","https://openalex.org/W1535810264","https://openalex.org/W1538332098","https://openalex.org/W1591211019","https://openalex.org/W1605557845","https://openalex.org/W1963947298","https://openalex.org/W1964281299","https://openalex.org/W1969501726","https://openalex.org/W2003619630","https://openalex.org/W2012559808","https://openalex.org/W2022413220","https://openalex.org/W2035991175","https://openalex.org/W2066852506","https://openalex.org/W2098010707","https://openalex.org/W2109219878","https://openalex.org/W2111927651","https://openalex.org/W2162800072","https://openalex.org/W2163563130","https://openalex.org/W2293825325","https://openalex.org/W2301356482","https://openalex.org/W2404678703","https://openalex.org/W2460232746","https://openalex.org/W2487602542","https://openalex.org/W2491829854","https://openalex.org/W2491836893","https://openalex.org/W2510394756","https://openalex.org/W2512784977","https://openalex.org/W2516668814","https://openalex.org/W2529582363","https://openalex.org/W2532499458","https://openalex.org/W2537014044","https://openalex.org/W2564856904","https://openalex.org/W2572561587","https://openalex.org/W2574009340","https://openalex.org/W2589255614","https://openalex.org/W2605597658","https://openalex.org/W2607362719","https://openalex.org/W2612403404","https://openalex.org/W2612687770","https://openalex.org/W2691795444","https://openalex.org/W2725598243","https://openalex.org/W2742948546","https://openalex.org/W2751989915","https://openalex.org/W2766313665","https://openalex.org/W2770572532","https://openalex.org/W2791034507","https://openalex.org/W2793118248","https://openalex.org/W2794691759","https://openalex.org/W2795222486","https://openalex.org/W2857435418","https://openalex.org/W2883613460","https://openalex.org/W2884163605","https://openalex.org/W2886541648","https://openalex.org/W2888798936","https://openalex.org/W2889199359","https://openalex.org/W2889508486","https://openalex.org/W2889929196","https://openalex.org/W2934419927","https://openalex.org/W2947243817","https://openalex.org/W2954241526","https://openalex.org/W2962832225","https://openalex.org/W2963311060","https://openalex.org/W2964281551","https://openalex.org/W2964339974","https://openalex.org/W2964590009","https://openalex.org/W2969173255","https://openalex.org/W2974322117","https://openalex.org/W2974891422","https://openalex.org/W2982848142","https://openalex.org/W3007037833","https://openalex.org/W3015177556","https://openalex.org/W3015844221","https://openalex.org/W3036003802","https://openalex.org/W3046609696","https://openalex.org/W3048784143","https://openalex.org/W3093210434","https://openalex.org/W3097736620","https://openalex.org/W3097990693","https://openalex.org/W4242926647"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W2002972382","https://openalex.org/W2744050077","https://openalex.org/W2294515590","https://openalex.org/W2607362719","https://openalex.org/W4297099544","https://openalex.org/W1605557845","https://openalex.org/W2404678703","https://openalex.org/W2066852506","https://openalex.org/W2580145876"],"abstract_inverted_index":{"To":[0,183],"defeat":[1],"ASLR":[2],"or":[3],"more":[4],"advanced":[5],"fine-grained":[6],"and":[7,38,143,150,172,217,226,230],"leakage-resistant":[8],"code":[9,215,248],"randomization":[10,146,232],"schemes,":[11],"modern":[12,259],"software":[13,181],"exploits":[14,208],"rely":[15],"on":[16],"information":[17],"disclosure":[18,175],"to":[19,104,165,177,241,252],"locate":[20],"gadgets":[21],"inside":[22],"the":[23,27,40,46,68,75,91,118,189,211,255],"victim's":[24,47],"code.":[25],"In":[26,85],"absence":[28],"of":[29,79,120,201,203,258],"such":[30,66],"info-leak":[31],"vulnerabilities,":[32],"attackers":[33],"can":[34,138],"still":[35],"hack":[36,105],"blind":[37,106,180,204],"derandomize":[39],"address":[41],"space":[42],"by":[43],"repeatedly":[44,139],"probing":[45,128,163],"memory":[48,101,122,142,170,223],"while":[49],"observing":[50],"crash":[51,115],"side":[52,134],"effects,":[53],"but":[54],"doing":[55],"so":[56,197],"is":[57,81,164,239],"only":[58],"feasible":[59],"for":[60,114],"crash-resistant":[61],"programs.":[62],"However,":[63],"high-value":[64],"targets":[65],"as":[67],"Linux":[69,190],"kernel":[70],"are":[71],"not":[72],"crash-resistant.":[73],"Moreover,":[74],"anomalously":[76],"large":[77],"number":[78],"crashes":[80,149],"often":[82],"easily":[83],"detectable.":[84],"this":[86],"paper,":[87],"we":[88,187],"show":[89,236],"that":[90,130,195,209,237],"Spectre":[92,167,229],"era":[93],"enables":[94],"an":[95],"attacker":[96],"armed":[97],"with":[98,213],"a":[99,192,221],"single":[100,222],"corruption":[102,171],"vulnerability":[103],"without":[107,148],"triggering":[108],"any":[109],"crashes.":[110],"Using":[111],"speculative":[112,127,162,185],"execution":[113],"suppression":[116],"allows":[117],"elevation":[119],"basic":[121],"write":[123,224],"vulnerabilities":[124],"into":[125],"powerful":[126],"primitives":[129,137,176],"leak":[131],"through":[132],"microarchitectural":[133],"effects.":[135],"Such":[136],"probe":[140],"victim":[141,194],"break":[144,166],"strong":[145,228,231],"schemes":[147],"bypass":[151,227],"all":[152],"deployed":[153],"mitigations":[154,168],"against":[155],"Spectre-like":[156],"attacks.":[157],"The":[158],"key":[159],"idea":[160],"behind":[161],"using":[169],"resurrect":[173],"Spectre-style":[174],"mount":[178,206],"practical":[179],"exploits.":[182],"showcase":[184],"probing,":[186],"target":[188],"kernel,":[191],"crash-sensitive":[193],"has":[196],"far":[198],"been":[199],"out":[200],"reach":[202],"attacks,":[205],"end-to-end":[207],"compromise":[210],"system":[212],"just-in-time":[214],"reuse":[216],"data-only":[218],"attacks":[219],"from":[220],"vulnerability,":[225],"defenses.":[233],"Our":[234],"results":[235],"it":[238],"crucial":[240],"consider":[242],"synergies":[243],"between":[244],"different":[245],"(Spectre":[246],"vs.":[247],"reuse)":[249],"threat":[250],"models":[251],"fully":[253],"comprehend":[254],"attack":[256],"surface":[257],"systems.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
