{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.06744","arxiv_id":"2605.06744","integrity":{"available":true,"endpoint":"/pith/2605.06744/integrity.json","summary":{"critical":0,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":0,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T12:42:04.007668Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T07:43:48.274716Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T18:31:19.286585Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T12:44:59.789635Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.cose.2024.104142.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.cose.2024.104142.URL","detected_arxiv_id":null,"ref_index":2,"audited_at":"2026-05-19T12:44:59.789635Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/VLSI-SoC57769.2023.10321927.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/VLSI-SoC57769.2023.10321927.URL","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-19T12:44:59.789635Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.10179341.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/SP46215.2023.10179341.URL","detected_arxiv_id":null,"ref_index":19,"audited_at":"2026-05-19T12:44:59.789635Z"}],"snapshot_sha256":"91a5de2d2e43a7cffd63d10dbc1d85315f5e22523564c9df7489589e146f6e5a"},"events":[{"event_id":1251,"event_type":"pith.integrity.v1","payload_sha256":"00bc216c6bc1b8fb1ce1bab07df2d2d552023a4cebd6ab0d6a0d2fc8e33496d8","signature_b64":"t2fb7cWfF7nc/pHnUK4/vOOyeyAVHnp1RX+IDbMK2CznWkkgQfQgsz1aHya3qrnAYAbLYSFgODFZd95ODuy3AQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:47:04.030627+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.10179341.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Endres Puschner et al. “Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations”. In:2023 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Soc","arxiv_id":"2605.06744","detector":"doi_compliance","evidence":{"ref_index":19,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Endres Puschner et al. “Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations”. In:2023 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Soc","reconstructed_doi":"10.1109/SP46215.2023.10179341.URL"},"severity":"advisory","ref_index":19,"audited_at":"2026-05-19T12:44:59.789635Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/SP46215.2023.10179341.URL","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"6f6afa724aacaed63369ee1778213c322d5e00e54563a2e033be58e4d3e781d6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1250,"event_type":"pith.integrity.v1","payload_sha256":"0429543f75852b376d9b21fe1bda8eadb8cef50b53c9e836795b271d3ffad60e","signature_b64":"BWMhl90h9NfOpUPTnP/yqgmnx5M4Pf4a0wtanQ5qribAhWPK+s7LCSLM//LZyfaXqHOtHwpwX5dg3/zSBp4yAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:47:04.029348+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/VLSI-SoC57769.2023.10321927.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Kais Belwafi et al. “Zero-Trust Communication between Chips”. In:2023 IFIP/IEEE 31st International Con- ference on Very Large Scale Integration (VLSI-SoC). Dubai, UAE: IEEE, 2023, pp. 1–5.DOI: 10.1109/VLSI- SoC57769.2023.10321927.URL: https","arxiv_id":"2605.06744","detector":"doi_compliance","evidence":{"ref_index":7,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Kais Belwafi et al. “Zero-Trust Communication between Chips”. In:2023 IFIP/IEEE 31st International Con- ference on Very Large Scale Integration (VLSI-SoC). Dubai, UAE: IEEE, 2023, pp. 1–5.DOI: 10.1109/VLSI- SoC57769.2023.10321927.URL: https","reconstructed_doi":"10.1109/VLSI-SoC57769.2023.10321927.URL"},"severity":"advisory","ref_index":7,"audited_at":"2026-05-19T12:44:59.789635Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/VLSI-SoC57769.2023.10321927.URL","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"37d678a79a55b49297a3c4093ea9764f88c14806c717d6b7364c5bfd160a52c7","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1249,"event_type":"pith.integrity.v1","payload_sha256":"eb0b4cad17578a4fab137bed493c927800e96794e0eb96a8df948cb229bcba69","signature_b64":"No9Dm4AfECwPwHbAs/O1kL07Gh8yfCFzGDS9Xx25eBU8CGMETi5uokiKfEhjc3Hbb/aMlVrQo4pnrrqHd2ZMAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:47:04.028164+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.cose.2024.104142.URL) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Renan C.A. Alves et al. “Testing the limits of SPDM: Authentication of intermittently connected devices”. In: Computers & Security148 (2025), p. 104142.ISSN: 0167-4048.DOI: https://doi.org/10.1016/j.cose.2024.10 4142.URL: https://www.scienc","arxiv_id":"2605.06744","detector":"doi_compliance","evidence":{"ref_index":2,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Renan C.A. Alves et al. “Testing the limits of SPDM: Authentication of intermittently connected devices”. In: Computers & Security148 (2025), p. 104142.ISSN: 0167-4048.DOI: https://doi.org/10.1016/j.cose.2024.10 4142.URL: https://www.scienc","reconstructed_doi":"10.1016/j.cose.2024.104142.URL"},"severity":"advisory","ref_index":2,"audited_at":"2026-05-19T12:44:59.789635Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.cose.2024.104142.URL","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"78591ac3bf20adb4bfff24a8003f6328c13b29c84551c749c8156d2e65ad92f7","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.06744/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}