{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:27OS2FNK7ZBYDNYFEZEL5SBBXK","short_pith_number":"pith:27OS2FNK","canonical_record":{"source":{"id":"1810.02242","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-09-10T13:45:03Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"cf6c5620b42dc2009802f4a73efa7cb924f58baed74962a1bae7c6c2d6a4778f","abstract_canon_sha256":"92196fc8c387424c8ced12e3353b88e5e03d6196b02ed0c4a54485fe11848f46"},"schema_version":"1.0"},"canonical_sha256":"d7dd2d15aafe4381b7052648bec821bab51503914c701d5cbf025bcd19ef65f6","source":{"kind":"arxiv","id":"1810.02242","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.02242","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"arxiv_version","alias_value":"1810.02242v2","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.02242","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"pith_short_12","alias_value":"27OS2FNK7ZBY","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"27OS2FNK7ZBYDNYF","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"27OS2FNK","created_at":"2026-05-18T12:31:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:27OS2FNK7ZBYDNYFEZEL5SBBXK","target":"record","payload":{"canonical_record":{"source":{"id":"1810.02242","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-09-10T13:45:03Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"cf6c5620b42dc2009802f4a73efa7cb924f58baed74962a1bae7c6c2d6a4778f","abstract_canon_sha256":"92196fc8c387424c8ced12e3353b88e5e03d6196b02ed0c4a54485fe11848f46"},"schema_version":"1.0"},"canonical_sha256":"d7dd2d15aafe4381b7052648bec821bab51503914c701d5cbf025bcd19ef65f6","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:03:31.545332Z","signature_b64":"79OnKlPCN3F8Beje090yWkifiU4v5sMKzrZeGPNNHPS7o/Kp4K61yp82MO2ib8FwCMlzd+Za7SqnPv3VE4uHDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d7dd2d15aafe4381b7052648bec821bab51503914c701d5cbf025bcd19ef65f6","last_reissued_at":"2026-05-18T00:03:31.544738Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:03:31.544738Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1810.02242","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:03:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ad3BlGb/5DbhQtFHh3CWaHoC/2wRaMjI2ZD7GSTYDGc1xC2o7BGGzPtunW2aEKcw1HuOPmY29PCV4eW2qFl0Dw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:16:24.936414Z"},"content_sha256":"6bdae2ddad7c8e5d4714808c4bd62cbe3e356f200ce3a45a423aeb0f473521b3","schema_version":"1.0","event_id":"sha256:6bdae2ddad7c8e5d4714808c4bd62cbe3e356f200ce3a45a423aeb0f473521b3"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:27OS2FNK7ZBYDNYFEZEL5SBBXK","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"PatternListener: Cracking Android Pattern Lock Using Acoustic Signals","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"eess.SP","authors_text":"Feng Xiao, Jingxiao Yang, Man Zhou, Qian Wang, Qi Li, Xiaofeng Chen, Zhibo Wang","submitted_at":"2018-09-10T13:45:03Z","abstract_excerpt":"Pattern lock has been widely used for authentication to protect user privacy on mobile devices (e.g., smartphones and tablets). Given its pervasive usage, the compromise of pattern lock could lead to serious consequences. Several attacks have been constructed to crack the lock. However, these approaches require the attackers to either be physically close to the target device or be able to manipulate the network facilities (e.g., WiFi hotspots) used by the victims. Therefore, the effectiveness of the attacks is significantly impacted by the environment of mobile devices. Also, these attacks are"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.02242","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:03:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"EjKPbi+o4ZT555mHbNmBZMoBeFkvtdDXGMAkJafCqcYTDgEF5qp4mfjHuae7g5goqagQt65JP74Cs+PvmXVuDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:16:24.936766Z"},"content_sha256":"d43df58019b37103d187a1c9b93344d16dc306275664cb66a068a61a5e93dee1","schema_version":"1.0","event_id":"sha256:d43df58019b37103d187a1c9b93344d16dc306275664cb66a068a61a5e93dee1"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/bundle.json","state_url":"https://pith.science/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T06:16:24Z","links":{"resolver":"https://pith.science/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK","bundle":"https://pith.science/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/bundle.json","state":"https://pith.science/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/state.json","well_known_bundle":"https://pith.science/.well-known/pith/27OS2FNK7ZBYDNYFEZEL5SBBXK/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:27OS2FNK7ZBYDNYFEZEL5SBBXK","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"92196fc8c387424c8ced12e3353b88e5e03d6196b02ed0c4a54485fe11848f46","cross_cats_sorted":["cs.SY"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-09-10T13:45:03Z","title_canon_sha256":"cf6c5620b42dc2009802f4a73efa7cb924f58baed74962a1bae7c6c2d6a4778f"},"schema_version":"1.0","source":{"id":"1810.02242","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.02242","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"arxiv_version","alias_value":"1810.02242v2","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.02242","created_at":"2026-05-18T00:03:31Z"},{"alias_kind":"pith_short_12","alias_value":"27OS2FNK7ZBY","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"27OS2FNK7ZBYDNYF","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"27OS2FNK","created_at":"2026-05-18T12:31:59Z"}],"graph_snapshots":[{"event_id":"sha256:d43df58019b37103d187a1c9b93344d16dc306275664cb66a068a61a5e93dee1","target":"graph","created_at":"2026-05-18T00:03:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Pattern lock has been widely used for authentication to protect user privacy on mobile devices (e.g., smartphones and tablets). Given its pervasive usage, the compromise of pattern lock could lead to serious consequences. Several attacks have been constructed to crack the lock. However, these approaches require the attackers to either be physically close to the target device or be able to manipulate the network facilities (e.g., WiFi hotspots) used by the victims. Therefore, the effectiveness of the attacks is significantly impacted by the environment of mobile devices. Also, these attacks are","authors_text":"Feng Xiao, Jingxiao Yang, Man Zhou, Qian Wang, Qi Li, Xiaofeng Chen, Zhibo Wang","cross_cats":["cs.SY"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-09-10T13:45:03Z","title":"PatternListener: Cracking Android Pattern Lock Using Acoustic Signals"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.02242","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6bdae2ddad7c8e5d4714808c4bd62cbe3e356f200ce3a45a423aeb0f473521b3","target":"record","created_at":"2026-05-18T00:03:31Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"92196fc8c387424c8ced12e3353b88e5e03d6196b02ed0c4a54485fe11848f46","cross_cats_sorted":["cs.SY"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SP","submitted_at":"2018-09-10T13:45:03Z","title_canon_sha256":"cf6c5620b42dc2009802f4a73efa7cb924f58baed74962a1bae7c6c2d6a4778f"},"schema_version":"1.0","source":{"id":"1810.02242","kind":"arxiv","version":2}},"canonical_sha256":"d7dd2d15aafe4381b7052648bec821bab51503914c701d5cbf025bcd19ef65f6","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d7dd2d15aafe4381b7052648bec821bab51503914c701d5cbf025bcd19ef65f6","first_computed_at":"2026-05-18T00:03:31.544738Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:03:31.544738Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"79OnKlPCN3F8Beje090yWkifiU4v5sMKzrZeGPNNHPS7o/Kp4K61yp82MO2ib8FwCMlzd+Za7SqnPv3VE4uHDA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:03:31.545332Z","signed_message":"canonical_sha256_bytes"},"source_id":"1810.02242","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6bdae2ddad7c8e5d4714808c4bd62cbe3e356f200ce3a45a423aeb0f473521b3","sha256:d43df58019b37103d187a1c9b93344d16dc306275664cb66a068a61a5e93dee1"],"state_sha256":"38d40bb09177cee440313378b22587ccafe4a287de574712c13b6be01bb5ed75"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OR+0DWs8S/xxaEcqVeQlN1mtmpAwllmrWTFiUTUhpntjPcl6qVNJuw5caz0pNFLofzuyN6XdK5SKwz7rWfNpAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T06:16:24.938721Z","bundle_sha256":"4b372b540eefabe8ce15eb4685bd0b902bdf1c7f1febfa152bf09bbe4c9dfa64"}}