{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.07814","arxiv_id":"2605.07814","integrity":{"available":true,"endpoint":"/pith/2605.07814/integrity.json","summary":{"critical":0,"advisory":4,"informational":0,"by_detector":{"doi_compliance":{"total":4,"critical":0,"advisory":4,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T10:02:14.014874Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T04:49:48.208542Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:31:18.798241Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T11:31:46.020671Z","findings_count":4}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-642-36563-8_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-642-36563-8_{1","detected_arxiv_id":null,"ref_index":40,"audited_at":"2026-05-19T11:31:46.020671Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-540-69100-6_{2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-540-69100-6_{2","detected_arxiv_id":null,"ref_index":31,"audited_at":"2026-05-19T11:31:46.020671Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-66399-9_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-319-66399-9_{1","detected_arxiv_id":null,"ref_index":110,"audited_at":"2026-05-19T11:31:46.020671Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-642-17322-6_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-642-17322-6_{1","detected_arxiv_id":null,"ref_index":37,"audited_at":"2026-05-19T11:31:46.020671Z"}],"snapshot_sha256":"f2d6fc33f0c06245405ee0a047449fb2d3933d8859de51a3b472efae80c24e2d"},"events":[{"event_id":1053,"event_type":"pith.integrity.v1","payload_sha256":"913641eae8fd5ee15ccbee16b140fbe4c4bdabfe8e67a8680253e4691f30b4cc","signature_b64":"RFT8tc9TV4jQItP+cVGMv87zK/o/DkEfyfxOyAm9LwVcIi+cfn/rUMo4zEZKP3lm9OvqcgEzHQLGNwIt00vFAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.845641+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-66399-9_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Siqi Ma, Ferdian Thung, David Lo, Cong Sun, and Robert H. Deng. 2017. VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. In European Symposium on Research in Computer Security (ESORICS). 229–246. https://doi.org/","arxiv_id":"2605.07814","detector":"doi_compliance","evidence":{"ref_index":110,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Siqi Ma, Ferdian Thung, David Lo, Cong Sun, and Robert H. Deng. 2017. VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. In European Symposium on Research in Computer Security (ESORICS). 229–246. https://doi.org/","reconstructed_doi":"10.1007/978-3-319-66399-9_{1"},"severity":"advisory","ref_index":110,"audited_at":"2026-05-19T11:31:46.020671Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-319-66399-9_{1","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"eacc21e79272b34c2d142c5e6dacce8a4df70e69a279ae997aed84f2bfed2592","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1052,"event_type":"pith.integrity.v1","payload_sha256":"5b225e445548d9169ecb5d34c803aa89e7b217b6951d11de0e1615f8aa612520","signature_b64":"7lnCwb/2UfvEja9Y5+p/wiM7zPoQTR362PD5XEONYSQDsHivC6e/aNdDw6RJ5t0KmQojxI7NlYqI1fPGXf4IDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.843013+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-642-36563-8_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, and David A. Wagner. 2013. An Empirical Study on the Effectiveness of Security Code Review. In International Symposium on Engineering Secure Software and Syst","arxiv_id":"2605.07814","detector":"doi_compliance","evidence":{"ref_index":40,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, and David A. Wagner. 2013. An Empirical Study on the Effectiveness of Security Code Review. In International Symposium on Engineering Secure Software and Syst","reconstructed_doi":"10.1007/978-3-642-36563-8_{1"},"severity":"advisory","ref_index":40,"audited_at":"2026-05-19T11:31:46.020671Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-642-36563-8_{1","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"86481608dc58017a5836260e3b7f6399b3756757df815763bd9024b852fad74c","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1051,"event_type":"pith.integrity.v1","payload_sha256":"84dda38dcc34ff381857a9ca9aa23b877eb85d3ab18e8f2d26c73c315ff9e7cc","signature_b64":"8GO5Rz2iGHzFfXkbDlmpvBSN6u9xqjdb+QRT9V11xjkldiSzxMdK7iMLUc7xzfeN2AYmdIKIvAWfEiSbPT0lAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.840695+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-642-17322-6_{1) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jürgen Ebert and Daniel Bildhauer. 2010. Reverse Engineering Using Graph Queries. In Graph Transformations and Model-Driven Engineering – Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday. Springer, 335–362. https://doi.","arxiv_id":"2605.07814","detector":"doi_compliance","evidence":{"ref_index":37,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jürgen Ebert and Daniel Bildhauer. 2010. Reverse Engineering Using Graph Queries. In Graph Transformations and Model-Driven Engineering – Essays Dedicated to Manfred Nagl on the Occasion of his 65th Birthday. Springer, 335–362. https://doi.","reconstructed_doi":"10.1007/978-3-642-17322-6_{1"},"severity":"advisory","ref_index":37,"audited_at":"2026-05-19T11:31:46.020671Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-642-17322-6_{1","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"ad31a67c01487333b3501b1c8aafca6f3cb50123f2df61aa10566ac88c71d32a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1050,"event_type":"pith.integrity.v1","payload_sha256":"da76ec8017f1b577919c30386ba02cf47d2118f9f5846173b437dcdaad14c6f2","signature_b64":"hKJg+tKnZWaHTwIkNfKVDO7zB7mnMXf846LJAAYdIEtmudOJwX98tToY7yRyoT6FRWF8475pXI46vLoHNB0dBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T11:32:01.838458+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-540-69100-6_{2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Manuel Clavel, Viviane Torres da Silva, Christiano Braga, and Marina Egea. 2008. Model-Driven Security in Practice: An Industrial Experience. In European Conference on Model Driven Architecture - Foundations and Applications (CMDA-FA). 326–","arxiv_id":"2605.07814","detector":"doi_compliance","evidence":{"ref_index":31,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Manuel Clavel, Viviane Torres da Silva, Christiano Braga, and Marina Egea. 2008. Model-Driven Security in Practice: An Industrial Experience. In European Conference on Model Driven Architecture - Foundations and Applications (CMDA-FA). 326–","reconstructed_doi":"10.1007/978-3-540-69100-6_{2"},"severity":"advisory","ref_index":31,"audited_at":"2026-05-19T11:31:46.020671Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-540-69100-6_{2","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"c4f71f17c4451b5fe44ca033713a7aea8cf9134b8a2048a6991c8f05adf82fd0","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.07814/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}