{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.27830","arxiv_id":"2604.27830","integrity":{"available":true,"endpoint":"/pith/2604.27830/integrity.json","summary":{"critical":1,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":1,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T21:38:11.551005Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T18:53:02.984402Z","findings_count":4}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3448609.url:https://doi.org/10.1145/3448609) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3448609.url:https://doi.org/10.1145/3448609","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-19T18:53:02.984402Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/2976749.2978343.url:https) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/2976749.2978343.url:https","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-19T18:53:02.984402Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/2494522.url:https://doi.org/10) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/2494522.url:https://doi.org/10","detected_arxiv_id":null,"ref_index":21,"audited_at":"2026-05-19T18:53:02.984402Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3712308.url:https://doi.org/10.1145/3712308' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3712308.url:https://doi.org/10.1145/3712308","detected_arxiv_id":null,"ref_index":29,"audited_at":"2026-05-19T18:53:02.984402Z"}],"snapshot_sha256":"e881ff782621b51de9aa217fb2209f5c43fdf88047280b2ee6522f67e47a98de"},"events":[{"event_id":2604,"event_type":"pith.integrity.v1","payload_sha256":"c882dffa8bbcc85cee8f61b67f4301efc5b7fca4cde8eaa9d9ab2008d79185d0","signature_b64":"6Lg78RrYcf3Gv+dlnl1LdyBH/hY0ijTD/9Ny8wv6HAYlC5q5amDMWa8X58Qq0XkplCCdSaFxwRk6jgIXVzlmBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:57:18.579067+00:00","payload":{"note":"Identifier '10.1145/3712308.url:https://doi.org/10.1145/3712308' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"A. Ruggia et al. “The Dark Side of Native Code on Android”. In:ACM Transactions on Privacy and Security28.2 (Feb. 2025), 13:1–13:33.doi: 10.1145/3712308.url:https://doi.org/10.1145/3712308","arxiv_id":"2604.27830","detector":"doi_compliance","evidence":{"doi":"10.1145/3712308.url:https://doi.org/10.1145/3712308","arxiv_id":null,"ref_index":29,"raw_excerpt":"A. Ruggia et al. “The Dark Side of Native Code on Android”. In:ACM Transactions on Privacy and Security28.2 (Feb. 2025), 13:1–13:33.doi: 10.1145/3712308.url:https://doi.org/10.1145/3712308","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":29,"audited_at":"2026-05-19T18:53:02.984402Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3712308.url:https://doi.org/10.1145/3712308","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"1fd48110cf9beab62391710d8dc9cf79a7701f9e5aa7c7d720d34b4ce5f446f2","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2603,"event_type":"pith.integrity.v1","payload_sha256":"9241e18663754bb1067959928c471a1c30a3e8a0db89c9edf6dc5202f98ac118","signature_b64":"Hcj5ZO+wps/qFZFKIYM2Lqh71j8FeK0DhGtiUqsntH79iVjKQp1AQ8ldK7bv7OSYIP0Uw06ELjN/R7wtBi/3Dg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:57:18.577790+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/2976749.2978343.url:https) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"M. Sun et al. “TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime”. In:Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Secu- rity, Vienna, Austria, October 24-28, 2016. Ed. by","arxiv_id":"2604.27830","detector":"doi_compliance","evidence":{"ref_index":22,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"M. Sun et al. “TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime”. In:Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Secu- rity, Vienna, Austria, October 24-28, 2016. Ed. by","reconstructed_doi":"10.1145/2976749.2978343.url:https"},"severity":"advisory","ref_index":22,"audited_at":"2026-05-19T18:53:02.984402Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/2976749.2978343.url:https","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"01dc696295c5cf61507667b0376390e88815e11e02c6b0073a0c9e98d6e232ba","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2602,"event_type":"pith.integrity.v1","payload_sha256":"b59d041c4fb401bfb7b0aba51972724c1c0bacdc630d4a72b955db42295f6219","signature_b64":"NF6AdKFBRbhaZU+MDBK4a7a/G/5Dym9+QkE6gXJcLZ6QvJGdziJIdBI0eH2AQqXeO+qDNMO68ha9DR+70SZsCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:57:18.575916+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/2494522.url:https://doi.org/10) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"W. Enck et al. “TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones”. In:Commun. ACM57.3 (2014), pp. 99–106.doi:10.1145/2494522.url: https://doi.org/10. 1145/2494522","arxiv_id":"2604.27830","detector":"doi_compliance","evidence":{"ref_index":21,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"W. Enck et al. “TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones”. In:Commun. ACM57.3 (2014), pp. 99–106.doi:10.1145/2494522.url: https://doi.org/10. 1145/2494522","reconstructed_doi":"10.1145/2494522.url:https://doi.org/10"},"severity":"advisory","ref_index":21,"audited_at":"2026-05-19T18:53:02.984402Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/2494522.url:https://doi.org/10","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"34eecbeccb07a697ccaecd7cfe3a2df940c3358e82b89a95040e541a62125db8","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2601,"event_type":"pith.integrity.v1","payload_sha256":"a637484f3eaece5dd93ba93f3b9f0d0535a2c916729a3e820cf3e4dd92f8c199","signature_b64":"xCKsbYtiR5hxED/wnPkn00gVoQzsB3hGOfBvMqWPHDA1bMhcYnf4XOQoC4b2biMGdunQ6bUmgcD9jWeuyPRaBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T18:57:18.572756+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3448609.url:https://doi.org/10.1145/3448609) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"R. Mayrhofer et al. “The Android Platform Security Model”. In:ACM Trans. Priv. Secur.24.3 (2021), 19:1–19:35.doi:10.1145/3448609.url: https://doi.org/10.1145/3448609","arxiv_id":"2604.27830","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"R. Mayrhofer et al. “The Android Platform Security Model”. In:ACM Trans. Priv. Secur.24.3 (2021), 19:1–19:35.doi:10.1145/3448609.url: https://doi.org/10.1145/3448609","reconstructed_doi":"10.1145/3448609.url:https://doi.org/10.1145/3448609"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-19T18:53:02.984402Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3448609.url:https://doi.org/10.1145/3448609","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"8ace57209e023fcdb9cd59e500865c7f399c9f2c80fe4d398105dfc12807f95a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.27830/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}