{"id":2055,"date":"2021-11-09T08:29:09","date_gmt":"2021-11-09T08:29:09","guid":{"rendered":"https:\/\/cbrc.ud.ac.ae\/blog\/?p=2055"},"modified":"2021-11-09T08:29:09","modified_gmt":"2021-11-09T08:29:09","slug":"hacking-electrical-vehicle-ev-management-systems","status":"publish","type":"post","link":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/","title":{"rendered":"Hacking Electrical Vehicle (EV) Management Systems"},"content":{"rendered":"<p>Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal. \u201cOur findings in this work identified vulnerabilities (weak systems) in more than 40 organizations, including Schneider Electric. We informed these organizations and some cooperated with us, fixed their issues, and eventually protected their systems. Furthermore, at least 12 CVEs have been published based on our work.\u201d<\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>The demand for Electric Vehicles (EVs) has been exponentially increasing, and to achieve sustainable growth, the industry dictated rapid development of the supporting infrastructure. This requires building a reliable EV charging ecosystem that serves customer demands while ensuring the security of the Internet-enabled systems and the connected critical infrastructure against possible cyber attacks. To this end, we devise a system lookup and collection approach to obtain a representative sample of widely deployed EV Charging Station Management Systems (EVCSMS). Furthermore, we leverage reverse engineering and penetration testing techniques to perform a first-of-a-kind comprehensive security and vulnerability analysis of the identified EVCSMS and their software\/firmware implementations. Indeed, our systematic analysis unveils an array of vulnerabilities, which demonstrate the insecurity of the EVCSMS against remote cyber attacks. Considering the feasibility of such attacks, we discuss attack implications against the EV charging stations (EVCS) and their users. More importantly, we simulate the impact of practical cyber attack scenarios against the power grid, which result in possible service disruption and failure in the grid. Finally, while we recommend mitigation measures, our discoveries raise concerns about the lack of adequate security considerations in the design of the deployed EVCS, which will motivate vendors to take immediate action to patch their developed systems. Indeed, our communication with the concerned parties resulted in positive responses from some vendors such as Schneider Electric, who acknowledged our findings by reserving 12 CVEs, respectively.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Top ranked international journal and impact<\/strong><\/p>\n<p>This work has been published as an article in the world\u2019s 6<sup>th<\/sup> best security journal (<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821003357\">Elsevier Computers &amp; Security<\/a>) under the Google Scholar category (Computer Security and Cryptograph), with Impact Factor (IF 4.43), H5-index (64), and H5-median (109).<\/p>\n<p>&nbsp;<\/p>\n<p><strong>The Team &amp; Affiliations<\/strong><\/p>\n<p>This research is a collaborative work between the University of Dubai, the Cyber Security Research Centre at Concordia University Canada, and the Cyber Center for Security and Analytics, and the University of Texas at San Antonio, San Antonio, Texas, USA.<\/p>\n<p>&nbsp;<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 Tony Nasr (Main author, <a href=\"https:\/\/steppa.ca\/\">Steppa Cyber<\/a> Security Engineer, CCCMTL)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 Dr. Sadegh Tourabi (Postdoctoral Research Fellow at George Mason University)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 Dr. Elias Bou Harb (Director at the UTSA Cyber Center for Security and Analytics)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 Dr. Claude Fachkha (Co-supervisor and faculty member at University of Dubai)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 Prof. Chadi Assi (Main supervisor and Professor at Concordia University Canada)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reference<\/strong><\/p>\n<p>More on this publication can be found below<\/p>\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821003357\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821003357<\/a><\/p>\n<p>T Nasr, S Torabi,\u00a0<a href=\"https:\/\/scholar.google.com\/citations?user=nxEcAJUAAAAJ&amp;hl=en&amp;oi=sra\">E Bou-Harb<\/a>,\u00a0<a href=\"https:\/\/scholar.google.com\/citations?user=mxx_FjUAAAAJ&amp;hl=en&amp;oi=sra\">C Fachkha<\/a>,\u00a0<a href=\"https:\/\/scholar.google.com\/citations?user=_ybDwMYAAAAJ&amp;hl=en&amp;oi=sra\">C Assi<\/a>. &#8220;Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems.&#8221;\u00a0<em>Computers &amp; Security<\/em>\u00a0(2021): 102511.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal. \u201cOur findings in this work identified vulnerabilities (weak systems) in more than 40 organizations, including Schneider Electric. We informed these organizations<\/p>\n","protected":false},"author":1,"featured_media":2056,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":{"0":"post-2055","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-journal-publication-2021"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Electrical Vehicle (EV) Management Systems - Research Magazine<\/title>\n<meta name=\"description\" content=\"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Electrical Vehicle (EV) Management Systems - Research Magazine\" \/>\n<meta property=\"og:description\" content=\"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/universityofdubai\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-09T08:29:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uniofdubai\" \/>\n<meta name=\"twitter:site\" content=\"@uniofdubai\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/person\/f686f7cf786f373eefe04b1eff87e601\"},\"headline\":\"Hacking Electrical Vehicle (EV) Management Systems\",\"datePublished\":\"2021-11-09T08:29:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\"},\"wordCount\":509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg\",\"articleSection\":[\"Journal publication 2021\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\",\"url\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\",\"name\":\"Hacking Electrical Vehicle (EV) Management Systems - Research Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg\",\"datePublished\":\"2021-11-09T08:29:09+00:00\",\"description\":\"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.\",\"breadcrumb\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage\",\"url\":\"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg\",\"contentUrl\":\"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cbrc.ud.ac.ae\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Electrical Vehicle (EV) Management Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#website\",\"url\":\"https:\/\/cbrc.ud.ac.ae\/blog\/\",\"name\":\"UD Research BLOG\/NEWS\",\"description\":\"University of Dubai Latest Researches and Updates\",\"publisher\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cbrc.ud.ac.ae\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#organization\",\"name\":\"UD Research BLOG\/NEWS\",\"url\":\"https:\/\/cbrc.ud.ac.ae\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/udv.ud.ac.ae\/cbrc\/blog\/wp-content\/uploads\/2021\/06\/cbrclogodark.png\",\"contentUrl\":\"https:\/\/udv.ud.ac.ae\/cbrc\/blog\/wp-content\/uploads\/2021\/06\/cbrclogodark.png\",\"width\":486,\"height\":94,\"caption\":\"UD Research BLOG\/NEWS\"},\"image\":{\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/universityofdubai\",\"https:\/\/x.com\/uniofdubai\",\"https:\/\/www.instagram.com\/uniofdubai\/\",\"https:\/\/www.linkedin.com\/school\/university-of-dubai\/\",\"https:\/\/www.youtube.com\/user\/uniofdubai\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/person\/f686f7cf786f373eefe04b1eff87e601\",\"name\":\"admin\",\"sameAs\":[\"https:\/\/ud.ac.ae\/cbrc-blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Electrical Vehicle (EV) Management Systems - Research Magazine","description":"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Electrical Vehicle (EV) Management Systems - Research Magazine","og_description":"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.","og_url":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/","og_site_name":"Research Magazine","article_publisher":"https:\/\/www.facebook.com\/universityofdubai","article_published_time":"2021-11-09T08:29:09+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@uniofdubai","twitter_site":"@uniofdubai","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#article","isPartOf":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/"},"author":{"name":"admin","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/person\/f686f7cf786f373eefe04b1eff87e601"},"headline":"Hacking Electrical Vehicle (EV) Management Systems","datePublished":"2021-11-09T08:29:09+00:00","mainEntityOfPage":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/"},"wordCount":509,"commentCount":0,"publisher":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#organization"},"image":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg","articleSection":["Journal publication 2021"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/","url":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/","name":"Hacking Electrical Vehicle (EV) Management Systems - Research Magazine","isPartOf":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage"},"image":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg","datePublished":"2021-11-09T08:29:09+00:00","description":"Dr. Claude Fachkha, a cyber security professional and a faculty member at the college of engineering and IT at the University of Dubai, has published an article in a top ranked international security journal.","breadcrumb":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#primaryimage","url":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg","contentUrl":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-content\/uploads\/2021\/11\/hack-claude.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/hacking-electrical-vehicle-ev-management-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cbrc.ud.ac.ae\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacking Electrical Vehicle (EV) Management Systems"}]},{"@type":"WebSite","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#website","url":"https:\/\/cbrc.ud.ac.ae\/blog\/","name":"UD Research BLOG\/NEWS","description":"University of Dubai Latest Researches and Updates","publisher":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cbrc.ud.ac.ae\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#organization","name":"UD Research BLOG\/NEWS","url":"https:\/\/cbrc.ud.ac.ae\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/udv.ud.ac.ae\/cbrc\/blog\/wp-content\/uploads\/2021\/06\/cbrclogodark.png","contentUrl":"https:\/\/udv.ud.ac.ae\/cbrc\/blog\/wp-content\/uploads\/2021\/06\/cbrclogodark.png","width":486,"height":94,"caption":"UD Research BLOG\/NEWS"},"image":{"@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/universityofdubai","https:\/\/x.com\/uniofdubai","https:\/\/www.instagram.com\/uniofdubai\/","https:\/\/www.linkedin.com\/school\/university-of-dubai\/","https:\/\/www.youtube.com\/user\/uniofdubai"]},{"@type":"Person","@id":"https:\/\/cbrc.ud.ac.ae\/blog\/#\/schema\/person\/f686f7cf786f373eefe04b1eff87e601","name":"admin","sameAs":["https:\/\/ud.ac.ae\/cbrc-blog"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/posts\/2055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/comments?post=2055"}],"version-history":[{"count":1,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/posts\/2055\/revisions"}],"predecessor-version":[{"id":2057,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/posts\/2055\/revisions\/2057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/media\/2056"}],"wp:attachment":[{"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/media?parent=2055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/categories?post=2055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cbrc.ud.ac.ae\/blog\/wp-json\/wp\/v2\/tags?post=2055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}