{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:23GM54KHRQPETV4R42EOVNLBTO","short_pith_number":"pith:23GM54KH","canonical_record":{"source":{"id":"1312.3245","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T17:06:16Z","cross_cats_sorted":[],"title_canon_sha256":"7253c0045756e21f3e170a10cbf153fdc02f8cb950840627a84603b16db7e9a9","abstract_canon_sha256":"dfd60e21d1918ffad22ad5f48d2ae6178c66dec527a386ea997b08a20296cb6d"},"schema_version":"1.0"},"canonical_sha256":"d6cccef1478c1e49d791e688eab5619bbc2c611b2a0b327417d57cb6a926f198","source":{"kind":"arxiv","id":"1312.3245","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.3245","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"arxiv_version","alias_value":"1312.3245v2","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.3245","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"pith_short_12","alias_value":"23GM54KHRQPE","created_at":"2026-05-18T12:27:30Z"},{"alias_kind":"pith_short_16","alias_value":"23GM54KHRQPETV4R","created_at":"2026-05-18T12:27:30Z"},{"alias_kind":"pith_short_8","alias_value":"23GM54KH","created_at":"2026-05-18T12:27:30Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:23GM54KHRQPETV4R42EOVNLBTO","target":"record","payload":{"canonical_record":{"source":{"id":"1312.3245","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T17:06:16Z","cross_cats_sorted":[],"title_canon_sha256":"7253c0045756e21f3e170a10cbf153fdc02f8cb950840627a84603b16db7e9a9","abstract_canon_sha256":"dfd60e21d1918ffad22ad5f48d2ae6178c66dec527a386ea997b08a20296cb6d"},"schema_version":"1.0"},"canonical_sha256":"d6cccef1478c1e49d791e688eab5619bbc2c611b2a0b327417d57cb6a926f198","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:57:43.265771Z","signature_b64":"DRzVrY/L+z/JgWZiIusenpkMW2PTovMlDv4TjdP1YZBVfYZYDHcgcjBkCuv6lxNv3VhUFg88KaOkwKXQOzxZCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d6cccef1478c1e49d791e688eab5619bbc2c611b2a0b327417d57cb6a926f198","last_reissued_at":"2026-05-18T02:57:43.265120Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:57:43.265120Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1312.3245","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:57:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hY/+n3/gGUtFzo3059oDa+abNZR/89WlmNtyddtE6cSP/b+m+cFUvEQAp08rUHH+kxyGAM4/aulI1LOMz/xHAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T02:31:12.775956Z"},"content_sha256":"9492ff922ffa9068363dce98c6f6a64cdaea2fa0088f9a35a2218511746c34ab","schema_version":"1.0","event_id":"sha256:9492ff922ffa9068363dce98c6f6a64cdaea2fa0088f9a35a2218511746c34ab"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:23GM54KHRQPETV4R42EOVNLBTO","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Adam J. Oliner, Eemil Lagerspetz, Hien Thi Thu Truong, N. Asokan, Petteri Nurmi, Sasu Tarkoma, Sourav Bhattacharya","submitted_at":"2013-12-11T17:06:16Z","abstract_excerpt":"There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous indepen"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.3245","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:57:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mr2HN+ozCXE6pKRMMrxDyasVOLitJKFLsZXg2eTVcVHNcjXCOpUxp/y4ez1DIOtgfTxNnaxaMO6KTGweGMXEAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T02:31:12.776328Z"},"content_sha256":"9dd3852d96b23c20ae370b4a598143bcf292f65e2b59f8e927b10f3284c3f1bd","schema_version":"1.0","event_id":"sha256:9dd3852d96b23c20ae370b4a598143bcf292f65e2b59f8e927b10f3284c3f1bd"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/23GM54KHRQPETV4R42EOVNLBTO/bundle.json","state_url":"https://pith.science/pith/23GM54KHRQPETV4R42EOVNLBTO/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/23GM54KHRQPETV4R42EOVNLBTO/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T02:31:12Z","links":{"resolver":"https://pith.science/pith/23GM54KHRQPETV4R42EOVNLBTO","bundle":"https://pith.science/pith/23GM54KHRQPETV4R42EOVNLBTO/bundle.json","state":"https://pith.science/pith/23GM54KHRQPETV4R42EOVNLBTO/state.json","well_known_bundle":"https://pith.science/.well-known/pith/23GM54KHRQPETV4R42EOVNLBTO/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:23GM54KHRQPETV4R42EOVNLBTO","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"dfd60e21d1918ffad22ad5f48d2ae6178c66dec527a386ea997b08a20296cb6d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T17:06:16Z","title_canon_sha256":"7253c0045756e21f3e170a10cbf153fdc02f8cb950840627a84603b16db7e9a9"},"schema_version":"1.0","source":{"id":"1312.3245","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.3245","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"arxiv_version","alias_value":"1312.3245v2","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.3245","created_at":"2026-05-18T02:57:43Z"},{"alias_kind":"pith_short_12","alias_value":"23GM54KHRQPE","created_at":"2026-05-18T12:27:30Z"},{"alias_kind":"pith_short_16","alias_value":"23GM54KHRQPETV4R","created_at":"2026-05-18T12:27:30Z"},{"alias_kind":"pith_short_8","alias_value":"23GM54KH","created_at":"2026-05-18T12:27:30Z"}],"graph_snapshots":[{"event_id":"sha256:9dd3852d96b23c20ae370b4a598143bcf292f65e2b59f8e927b10f3284c3f1bd","target":"graph","created_at":"2026-05-18T02:57:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous indepen","authors_text":"Adam J. Oliner, Eemil Lagerspetz, Hien Thi Thu Truong, N. Asokan, Petteri Nurmi, Sasu Tarkoma, Sourav Bhattacharya","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T17:06:16Z","title":"The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.3245","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9492ff922ffa9068363dce98c6f6a64cdaea2fa0088f9a35a2218511746c34ab","target":"record","created_at":"2026-05-18T02:57:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"dfd60e21d1918ffad22ad5f48d2ae6178c66dec527a386ea997b08a20296cb6d","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T17:06:16Z","title_canon_sha256":"7253c0045756e21f3e170a10cbf153fdc02f8cb950840627a84603b16db7e9a9"},"schema_version":"1.0","source":{"id":"1312.3245","kind":"arxiv","version":2}},"canonical_sha256":"d6cccef1478c1e49d791e688eab5619bbc2c611b2a0b327417d57cb6a926f198","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d6cccef1478c1e49d791e688eab5619bbc2c611b2a0b327417d57cb6a926f198","first_computed_at":"2026-05-18T02:57:43.265120Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:57:43.265120Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"DRzVrY/L+z/JgWZiIusenpkMW2PTovMlDv4TjdP1YZBVfYZYDHcgcjBkCuv6lxNv3VhUFg88KaOkwKXQOzxZCA==","signature_status":"signed_v1","signed_at":"2026-05-18T02:57:43.265771Z","signed_message":"canonical_sha256_bytes"},"source_id":"1312.3245","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9492ff922ffa9068363dce98c6f6a64cdaea2fa0088f9a35a2218511746c34ab","sha256:9dd3852d96b23c20ae370b4a598143bcf292f65e2b59f8e927b10f3284c3f1bd"],"state_sha256":"38bf201aafae247aff7af148472f4656bb4255748eb4d59cc52a87de906830bb"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wxPfz94TT5cfRmF3C8s8QWvZIn+MKPl9naeHskVYYCyb7wJDI4rFzmkA/mSDgw9j/EunVK1xAWOK2nlK8NkGBQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T02:31:12.778579Z","bundle_sha256":"07e1a8a3b865b103243595659aa554cc073a82e3ec331a0475aca43002b4f4e5"}}