{"id":19,"date":"2014-11-27T14:50:32","date_gmt":"2014-11-27T14:50:32","guid":{"rendered":"http:\/\/sdash.isg.rhul.ac.uk\/?page_id=19"},"modified":"2025-07-02T09:40:19","modified_gmt":"2025-07-02T09:40:19","slug":"about","status":"publish","type":"page","link":"https:\/\/santanu.uk\/","title":{"rendered":"About"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/santanu.uk\/wp-content\/uploads\/2022\/08\/passport-150x150.jpg\" alt=\"\" class=\"wp-image-157\" style=\"width:135px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>I am a Senior Lecturer in the Department of Computer Science at University of Surrey. My research interests are in Secure Software Engineering, specifically automatic analysis and transformation of software. <\/p>\n\n\n\n<p>I work on open-source software as well as binaries and have published my work in flagship venues across Software Engineering and Security such as ICSE, FSE and Usenix Security. I am funded and trained by the UK Research Councils through their New Investigator Award and Future Leaders Pathways programme. <\/p>\n\n\n\n<p><strong>Selected Publications<\/strong><br><div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><table class=\"teachpress_publication_list\"><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Raffa G;  Blasco J;  O'Keeffe D;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\">CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">Usenix Security 2025, <\/span>Forthcoming.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_34\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('34','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_34\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{giuseppe_usenix,<br \/>\r\ntitle = {CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications},<br \/>\r\nauthor = {Giuseppe Raffa and Jorge Blasco and Dan O'Keeffe and Santanu Kumar Dash},<br \/>\r\nyear  = {2025},<br \/>\r\ndate = {2025-06-26},<br \/>\r\nurldate = {2025-06-26},<br \/>\r\nbooktitle = {Usenix Security 2025},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {forthcoming},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('34','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_inproceedings\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Tileria M;  Blasco J;  Dash S K<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('35','tp_links')\" style=\"cursor:pointer;\">DocFlow: Extracting Taint Specifications from Software Documentation<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_address\">Lisbon, Portugal, <\/span><span class=\"tp_pub_additional_year\">2024<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type inproceedings\">Inproceedings<\/span> | <span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_abstract')\" title=\"Show abstract\" style=\"cursor:pointer;\">Abstract<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_35\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('35','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_35\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{10.1145\/3597503.3623312,<br \/>\r\ntitle = {DocFlow: Extracting Taint Specifications from Software Documentation},<br \/>\r\nauthor = {Marcos Tileria and Jorge Blasco and Santanu Kumar Dash},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3597503.3623312},<br \/>\r\ndoi = {10.1145\/3597503.3623312},<br \/>\r\nyear  = {2024},<br \/>\r\ndate = {2024-01-01},<br \/>\r\nurldate = {2024-01-01},<br \/>\r\nbooktitle = {Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering},<br \/>\r\npublisher = {ACM},<br \/>\r\naddress = {Lisbon, Portugal},<br \/>\r\nseries = {ICSE '24},<br \/>\r\nabstract = {Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_35\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_abstract')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_35\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3597503.3623312\" title=\"https:\/\/doi.org\/10.1145\/3597503.3623312\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3597503.3623312<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3597503.3623312\" title=\"Follow DOI:10.1145\/3597503.3623312\" target=\"_blank\">doi:10.1145\/3597503.3623312<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('35','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> P\u00e2rtachi P;  Dash S K;  Allamanis M;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('4','tp_links')\" style=\"cursor:pointer;\">Flexeme: Untangling Commits Using Lexical Flows<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">28th ACM Joint European Software Engineering Conference \r\n and Symposium on the Foundations of Software Engineering, <\/span><span class=\"tp_pub_additional_series\">ESEC\/FSE '20 <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_4\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/sigsoft\/PartachiDAB20,<br \/>\r\ntitle = {Flexeme: Untangling Commits Using Lexical Flows},<br \/>\r\nauthor = {Profir-Petru P\u00e2rtachi and Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},<br \/>\r\neditor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3368089.3409693},<br \/>\r\ndoi = {10.1145\/3368089.3409693},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {28th ACM Joint European Software Engineering Conference <br \/>\r\n and Symposium on the Foundations of Software Engineering},<br \/>\r\npages = {63--74},<br \/>\r\npublisher = {ACM},<br \/>\r\nseries = {ESEC\/FSE '20},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_4\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3368089.3409693\" title=\"https:\/\/doi.org\/10.1145\/3368089.3409693\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3368089.3409693<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3368089.3409693\" title=\"Follow DOI:10.1145\/3368089.3409693\" target=\"_blank\">doi:10.1145\/3368089.3409693<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> P\u00e2rtachi P;  Dash S K;  Treude C;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('5','tp_links')\" style=\"cursor:pointer;\">POSIT: Simultaneously Tagging Natural and Programming Languages<\/a><\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">ICSE '20: 42nd International Conference on Software Engineering, \r\n Seoul, South Korea, 27 June - 19 July, 2020, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2020<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_5\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{DBLP:conf\/icse\/PartachiDTB20,<br \/>\r\ntitle = {POSIT: Simultaneously Tagging Natural and Programming Languages},<br \/>\r\nauthor = {Profir-Petru P\u00e2rtachi and Santanu Kumar Dash and Christoph Treude and Earl T. Barr},<br \/>\r\neditor = {Gregg Rothermel and Doo-Hwan Bae},<br \/>\r\nurl = {https:\/\/doi.org\/10.1145\/3377811.3380440},<br \/>\r\ndoi = {10.1145\/3377811.3380440},<br \/>\r\nyear  = {2020},<br \/>\r\ndate = {2020-01-01},<br \/>\r\nurldate = {2020-01-01},<br \/>\r\nbooktitle = {ICSE '20: 42nd International Conference on Software Engineering, <br \/>\r\n Seoul, South Korea, 27 June - 19 July, 2020},<br \/>\r\npages = {1348--1358},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_5\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/doi.org\/10.1145\/3377811.3380440\" title=\"https:\/\/doi.org\/10.1145\/3377811.3380440\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3377811.3380440<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/3377811.3380440\" title=\"Follow DOI:10.1145\/3377811.3380440\" target=\"_blank\">doi:10.1145\/3377811.3380440<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_links')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Dash S K;  Allamanis M;  Barr E T<\/span>: <span class=\"tp_pub_title_simple\">RefiNym: Using Names to Refine Types<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, <\/span><span class=\"tp_pub_additional_series\">ESEC\/FSE'18 <\/span><span class=\"tp_pub_additional_year\">2018<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_10\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_10\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{refinym,<br \/>\r\ntitle = {RefiNym: Using Names to Refine Types},<br \/>\r\nauthor = {Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},<br \/>\r\nyear  = {2018},<br \/>\r\ndate = {2018-01-01},<br \/>\r\nurldate = {2018-01-01},<br \/>\r\nbooktitle = {26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering},<br \/>\r\nseries = {ESEC\/FSE'18},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><tr class=\"tp_publication_simple tp_publication_simple_conference\"><td class=\"tp_pub_info_simple\"><span class=\"tp_pub_author_simple\"> Jordaney R;  Sharad K;  Dash S K;  Wang Z;  Papini D;  Nouretdinov I;  Cavallaro L<\/span>: <span class=\"tp_pub_title_simple\">Transcend: Detecting Concept Drift in Malware Classification Models<\/span>. <span class=\"tp_pub_additional_simple\"><span class=\"tp_pub_additional_booktitle\">26th USENIX Security Symposium (USENIX Security 17), <\/span><span class=\"tp_pub_additional_publisher\">USENIX Association, <\/span><span class=\"tp_pub_additional_year\">2017<\/span>.<\/span> <span class=\"tp_pub_menu_simple\">(Type: <span class=\"tp_pub_type conference\">Conference<\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_12\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span>)<\/span><div class=\"tp_bibtex\" id=\"tp_bibtex_12\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@conference{transcend,<br \/>\r\ntitle = {Transcend: Detecting Concept Drift in Malware Classification Models},<br \/>\r\nauthor = {Roberto Jordaney and Kumar Sharad and Santanu K. Dash and Zhi Wang and Davide Papini and Ilia Nouretdinov and Lorenzo Cavallaro},<br \/>\r\nyear  = {2017},<br \/>\r\ndate = {2017-01-01},<br \/>\r\nurldate = {2017-01-01},<br \/>\r\nbooktitle = {26th USENIX Security Symposium (USENIX Security 17)},<br \/>\r\npages = {625--642},<br \/>\r\npublisher = {USENIX Association},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {conference}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\">Close<\/a><\/p><\/div><\/td><\/tr><\/table><\/div><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I am a Senior Lecturer in the Department of Computer Science at University of Surrey. My research interests are in Secure Software Engineering, specifically automatic analysis and transformation of software. I work on open-source software as well as binaries and have published my work in flagship venues across Software Engineering and Security such as ICSE, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-19","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":78,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/pages\/19\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/santanu.uk\/index.php\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}