{"id":833,"date":"2023-07-10T00:26:54","date_gmt":"2023-07-10T00:26:54","guid":{"rendered":"https:\/\/afshin-soltani.com\/?p=833"},"modified":"2024-12-10T00:54:51","modified_gmt":"2024-12-10T00:54:51","slug":"my-master-thesis-project-volvo-group","status":"publish","type":"post","link":"https:\/\/afshin-soltani.com\/?p=833","title":{"rendered":"My Master Thesis Project @ Volvo Group"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"833\" class=\"elementor elementor-833\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a013a1b e-flex e-con-boxed e-con e-parent\" data-id=\"5a013a1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-687d21b2 elementor-widget elementor-widget-text-editor\" data-id=\"687d21b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Abstract<\/h2>\n<p>In recent years, we have witnessed that technology has advanced dramatically. While new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), automotive industry was also affected by such a trend. Connected, electric, highly-automated and autonomous vehicles are making their way into our lives. As a result of this paradigm shift, new security challenges are introduced in the automotive industry. Vehicles are comprised of tens or sometimes a hundred of computers, also known as Electronic Control Units (ECUs) that need to communicate and be interconnected in order for the vehicle to function properly. Protecting vehicles from potential threats and attacks that may compromise the security and consequently the safety of both the vehicle and the passenger is of great importance. Hence, a comprehensible attack analysis methodology is needed to model the possible attacks in vehicles. Attack analysis is part of the risk assessment process. To have an accurate risk analysis, two factors are needed: first, the impact of an attack vector, which is not the subject of this thesis, and second, the feasibility of an attack path which is what we address as a part of our thesis using the nominated attack analysis methodology. In this thesis, we investigate existing methodologies for modelling attacks and try to nominate one that is most suitable for the automotive industry. This judgement is based on a list of criteria that are collected either through surveying previous related works or through interviewing industrial and academic experts. Once the methodology is nominated, we introduce a method for calculating the feasibility of different possible attack paths using the proposed methodology. Finally, we use some use cases by means of which we demonstrate how our nominated method can be used to model attacks against some assets and how the feasibility of each attack vector can be calculated for the use cases.<\/p>\n<p>\u00a0<\/p>\n<p>1.1 Background The current automotive industry is leading toward producing vehicles with autonomous driving or an advanced driver-assistance system [4]. In order to fulfill such smart capabilities and also equip the vehicle with more functional features such as Intelligent Transport Systems (ITS), different levels of connectivity needs to be considered in the architecture level. Different communication channels are being developed such as vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) in order to fulfill ITS different goals, including increase of roads safety and traffic flow [5]. Moreover, vehicles also need to become connected to the Cloud services for remote diagnostics or remote software updates [6], [7]. Figure 1.1 illustrates this connection and communication. Although the evolution trend seems to bring more functionality and intelligence into the automotive sector, however, this can also make modern vehicles subject to various types of intrusion and malicious activities which could be considered as major threats to both the humans factor and the vehicle itself. In order to provide inter-connectivity, connected vehicles rely on wireless and cellular communication interfaces. This exposes them to a wide range of security risks. In 2015, Miller and Valasek [8] performed a research on possible remote attacks on vehicles and they succeeded in breaking into a Jeep Cherokee and consequently taking control over the steering and the braking systems. In the big rig truck\u2019s scenario which happened in 2016, attackers succeeded to gain control over the accelerator and the braking system [9]. Lack of safety in a vehicle could lead to major disasters such as loss of life, therefore security breaches are highly intolerable in automotive industry. As a result, there is an ever-increasing public concern toward the cybersecurity of autonomous and connected vehicles [10].<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-835 aligncenter\" src=\"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57-300x270.png\" alt=\"\" width=\"300\" height=\"270\" srcset=\"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57-300x270.png 300w, https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57-1024x920.png 1024w, https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57-768x690.png 768w, https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57-367x330.png 367w, https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/Screenshot-2024-12-10-at-01.31.57.png 1400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>In order to tackle cybersecurity concerns in the automotive industry, threat modeling and risk assessment frameworks have been developed [11]. Risk assessment methods usually start with the asset identification step where critical assets are identified. Then by considering standard damage scenarios, different threats to those assets are classified via threat analysis procedures. Thereafter, impact assessment is done by determining the impact levels associated with a compromised asset. As the security design process proceeds, different vulnerabilities may emerge through the vulnerability analysis stage. Eventually, by means of a comprehensive attack analysis method, potential attack paths and their associated feasibility are analyzed. The results derived from the risk assessment process are the basis upon which the risk treatment is applied as the closing stage [12].<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-105f75c elementor-widget elementor-widget-eael-creative-button\" data-id=\"105f75c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--ujarak eael-cb-icon-position-left\" href=\"https:\/\/odr.chalmers.se\/server\/api\/core\/bitstreams\/14224fa5-c2cf-4abf-9663-027718964c56\/content\" data-text=\"Download\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                                            <span class=\"eael-creative-button-icon-left\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-download\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 0h80c13.3 0 24 10.7 24 24v168h87.7c17.8 0 26.7 21.5 14.1 34.1L269.7 378.3c-7.5 7.5-19.8 7.5-27.3 0L90.1 226.1c-12.6-12.6-3.7-34.1 14.1-34.1H192V24c0-13.3 10.7-24 24-24zm296 376v112c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V376c0-13.3 10.7-24 24-24h146.7l49 49c20.1 20.1 52.5 20.1 72.6 0l49-49H488c13.3 0 24 10.7 24 24zm-124 88c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20zm64 0c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20z\"><\/path><\/svg><\/span>                    \n                    <span class=\"cretive-button-text\">Download the Full Thesis<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Abstract In recent years, we have witnessed that technology has advanced dramatically. While new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":849,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[18,14,7,17,15,8,21,22,20,19,16],"class_list":["post-833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","tag-attack-analysis","tag-automotive-security","tag-cybersecurity","tag-cybersecurity-management-system","tag-iso-sae21434","tag-product-security","tag-risk-assessment","tag-risk-management","tag-tara","tag-threat-analysis","tag-unr155"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>My Master Thesis Project @ Volvo Group - Afshin Soltani<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/afshin-soltani.com\/?p=833\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"My Master Thesis Project @ Volvo Group - Afshin Soltani\" \/>\n<meta property=\"og:description\" content=\"Abstract In recent years, we have witnessed that technology has advanced dramatically. While new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/afshin-soltani.com\/?p=833\" \/>\n<meta property=\"og:site_name\" content=\"Afshin Soltani\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T00:26:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-10T00:54:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Afshin Soltani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Afshin Soltani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833\"},\"author\":{\"name\":\"Afshin Soltani\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/#\\\/schema\\\/person\\\/5d0aeda510b6413bf1527e21ec508fe9\"},\"headline\":\"My Master Thesis Project @ Volvo Group\",\"datePublished\":\"2023-07-10T00:26:54+00:00\",\"dateModified\":\"2024-12-10T00:54:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833\"},\"wordCount\":742,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/afshin-soltani.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/vehisec.png\",\"keywords\":[\"Attack Analysis\",\"automotive security\",\"Cybersecurity\",\"Cybersecurity Management system\",\"ISO\\\/SAE21434\",\"product security\",\"Risk Assessment\",\"Risk Management\",\"TARA\",\"Threat Analysis\",\"UNR155\"],\"articleSection\":[\"Publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833\",\"url\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833\",\"name\":\"My Master Thesis Project @ Volvo Group - Afshin Soltani\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/afshin-soltani.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/vehisec.png\",\"datePublished\":\"2023-07-10T00:26:54+00:00\",\"dateModified\":\"2024-12-10T00:54:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/#\\\/schema\\\/person\\\/5d0aeda510b6413bf1527e21ec508fe9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/afshin-soltani.com\\\/?p=833\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#primaryimage\",\"url\":\"https:\\\/\\\/afshin-soltani.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/vehisec.png\",\"contentUrl\":\"https:\\\/\\\/afshin-soltani.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/vehisec.png\",\"width\":850,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/?p=833#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/afshin-soltani.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My Master Thesis Project @ Volvo Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/#website\",\"url\":\"https:\\\/\\\/afshin-soltani.com\\\/\",\"name\":\"Afshin Soltani\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/afshin-soltani.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/afshin-soltani.com\\\/#\\\/schema\\\/person\\\/5d0aeda510b6413bf1527e21ec508fe9\",\"name\":\"Afshin Soltani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g\",\"caption\":\"Afshin Soltani\"},\"url\":\"https:\\\/\\\/afshin-soltani.com\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My Master Thesis Project @ Volvo Group - Afshin Soltani","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/afshin-soltani.com\/?p=833","og_locale":"en_US","og_type":"article","og_title":"My Master Thesis Project @ Volvo Group - Afshin Soltani","og_description":"Abstract In recent years, we have witnessed that technology has advanced dramatically. While new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), [&hellip;]","og_url":"https:\/\/afshin-soltani.com\/?p=833","og_site_name":"Afshin Soltani","article_published_time":"2023-07-10T00:26:54+00:00","article_modified_time":"2024-12-10T00:54:51+00:00","og_image":[{"width":850,"height":478,"url":"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png","type":"image\/png"}],"author":"Afshin Soltani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Afshin Soltani","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/afshin-soltani.com\/?p=833#article","isPartOf":{"@id":"https:\/\/afshin-soltani.com\/?p=833"},"author":{"name":"Afshin Soltani","@id":"https:\/\/afshin-soltani.com\/#\/schema\/person\/5d0aeda510b6413bf1527e21ec508fe9"},"headline":"My Master Thesis Project @ Volvo Group","datePublished":"2023-07-10T00:26:54+00:00","dateModified":"2024-12-10T00:54:51+00:00","mainEntityOfPage":{"@id":"https:\/\/afshin-soltani.com\/?p=833"},"wordCount":742,"commentCount":0,"image":{"@id":"https:\/\/afshin-soltani.com\/?p=833#primaryimage"},"thumbnailUrl":"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png","keywords":["Attack Analysis","automotive security","Cybersecurity","Cybersecurity Management system","ISO\/SAE21434","product security","Risk Assessment","Risk Management","TARA","Threat Analysis","UNR155"],"articleSection":["Publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/afshin-soltani.com\/?p=833#respond"]}]},{"@type":"WebPage","@id":"https:\/\/afshin-soltani.com\/?p=833","url":"https:\/\/afshin-soltani.com\/?p=833","name":"My Master Thesis Project @ Volvo Group - Afshin Soltani","isPartOf":{"@id":"https:\/\/afshin-soltani.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/afshin-soltani.com\/?p=833#primaryimage"},"image":{"@id":"https:\/\/afshin-soltani.com\/?p=833#primaryimage"},"thumbnailUrl":"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png","datePublished":"2023-07-10T00:26:54+00:00","dateModified":"2024-12-10T00:54:51+00:00","author":{"@id":"https:\/\/afshin-soltani.com\/#\/schema\/person\/5d0aeda510b6413bf1527e21ec508fe9"},"breadcrumb":{"@id":"https:\/\/afshin-soltani.com\/?p=833#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/afshin-soltani.com\/?p=833"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/afshin-soltani.com\/?p=833#primaryimage","url":"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png","contentUrl":"https:\/\/afshin-soltani.com\/wp-content\/uploads\/2024\/12\/vehisec.png","width":850,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/afshin-soltani.com\/?p=833#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/afshin-soltani.com\/"},{"@type":"ListItem","position":2,"name":"My Master Thesis Project @ Volvo Group"}]},{"@type":"WebSite","@id":"https:\/\/afshin-soltani.com\/#website","url":"https:\/\/afshin-soltani.com\/","name":"Afshin Soltani","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/afshin-soltani.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/afshin-soltani.com\/#\/schema\/person\/5d0aeda510b6413bf1527e21ec508fe9","name":"Afshin Soltani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/be6db1753ead0082991f386e88b4530dddd66410724db401e968e0af00d60236?s=96&d=mm&r=g","caption":"Afshin Soltani"},"url":"https:\/\/afshin-soltani.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/posts\/833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=833"}],"version-history":[{"count":5,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions"}],"predecessor-version":[{"id":850,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions\/850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=\/wp\/v2\/media\/849"}],"wp:attachment":[{"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afshin-soltani.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}