{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:3PH6ILFXWU3JE7FIBHJFFMVQ66","short_pith_number":"pith:3PH6ILFX","canonical_record":{"source":{"id":"1511.06554","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","cross_cats_sorted":[],"title_canon_sha256":"96f86a21173ca3ef1bebcc87ef11c60718c3e08a7884468282b44836d0ed95ea","abstract_canon_sha256":"0f85e906627da05019d1f38e7bbcbe5326f3f38c66d3265cebfed971180ea709"},"schema_version":"1.0"},"canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","source":{"kind":"arxiv","id":"1511.06554","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.06554","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"arxiv_version","alias_value":"1511.06554v1","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.06554","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"pith_short_12","alias_value":"3PH6ILFXWU3J","created_at":"2026-05-18T12:29:02Z"},{"alias_kind":"pith_short_16","alias_value":"3PH6ILFXWU3JE7FI","created_at":"2026-05-18T12:29:02Z"},{"alias_kind":"pith_short_8","alias_value":"3PH6ILFX","created_at":"2026-05-18T12:29:02Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:3PH6ILFXWU3JE7FIBHJFFMVQ66","target":"record","payload":{"canonical_record":{"source":{"id":"1511.06554","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","cross_cats_sorted":[],"title_canon_sha256":"96f86a21173ca3ef1bebcc87ef11c60718c3e08a7884468282b44836d0ed95ea","abstract_canon_sha256":"0f85e906627da05019d1f38e7bbcbe5326f3f38c66d3265cebfed971180ea709"},"schema_version":"1.0"},"canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:26:24.286151Z","signature_b64":"sPjk9eZtUxcOW30sQH1lAwBFJACON6KB8MnED779YSaJzk+fRnW+Sbnd+/8mK0cpJBFH0EfeA+7hU014LZMUAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","last_reissued_at":"2026-05-18T01:26:24.285648Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:26:24.285648Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1511.06554","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8jiJRjOTaTlr3WtNkXNwowlJh/tm9okPMaDiPb5GdkTdW5RRHhDaVxWU6n06xnY0WjDNHvfjPoqL4yazyB9IDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T15:16:03.479767Z"},"content_sha256":"d99d7d9ace93e8193ef69d1563da736017d47d28b4ecd3be7306e424cd89fe6b","schema_version":"1.0","event_id":"sha256:d99d7d9ace93e8193ef69d1563da736017d47d28b4ecd3be7306e424cd89fe6b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:3PH6ILFXWU3JE7FIBHJFFMVQ66","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"An Investigation into the Use of Common Libraries in Android Apps","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Jacques Klein, Li Li, Tegawend\\'e F. Bissyand\\'e, Yves Le Traon","submitted_at":"2015-11-20T10:49:27Z","abstract_excerpt":"The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part of the functionality delivered by the app. Such code is often contributed by the common libraries which are used pervasively by all apps. Unfortunately, Android analyses, e.g., for piggybacking detection and malware detection, can produce inaccurate results if they do not take into account the case of library code, which constitute noise in app features. Despite some efforts on investigat"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.06554","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"x3PVehv0N4x6bRHVNZ+kGOUm7qaezP1IV4YZ7bmwWS2Hfp0F4Qz+iZ50M/B99pcilJ+GKCqvG8LfjPDwHlKdCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T15:16:03.480110Z"},"content_sha256":"fc5c4e01d1d312440ed266f3c03612349c661455219e7444eb333ec56fcb0a6f","schema_version":"1.0","event_id":"sha256:fc5c4e01d1d312440ed266f3c03612349c661455219e7444eb333ec56fcb0a6f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/bundle.json","state_url":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T15:16:03Z","links":{"resolver":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66","bundle":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/bundle.json","state":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/state.json","well_known_bundle":"https://pith.science/.well-known/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:3PH6ILFXWU3JE7FIBHJFFMVQ66","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0f85e906627da05019d1f38e7bbcbe5326f3f38c66d3265cebfed971180ea709","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","title_canon_sha256":"96f86a21173ca3ef1bebcc87ef11c60718c3e08a7884468282b44836d0ed95ea"},"schema_version":"1.0","source":{"id":"1511.06554","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.06554","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"arxiv_version","alias_value":"1511.06554v1","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.06554","created_at":"2026-05-18T01:26:24Z"},{"alias_kind":"pith_short_12","alias_value":"3PH6ILFXWU3J","created_at":"2026-05-18T12:29:02Z"},{"alias_kind":"pith_short_16","alias_value":"3PH6ILFXWU3JE7FI","created_at":"2026-05-18T12:29:02Z"},{"alias_kind":"pith_short_8","alias_value":"3PH6ILFX","created_at":"2026-05-18T12:29:02Z"}],"graph_snapshots":[{"event_id":"sha256:fc5c4e01d1d312440ed266f3c03612349c661455219e7444eb333ec56fcb0a6f","target":"graph","created_at":"2026-05-18T01:26:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part of the functionality delivered by the app. Such code is often contributed by the common libraries which are used pervasively by all apps. Unfortunately, Android analyses, e.g., for piggybacking detection and malware detection, can produce inaccurate results if they do not take into account the case of library code, which constitute noise in app features. Despite some efforts on investigat","authors_text":"Jacques Klein, Li Li, Tegawend\\'e F. Bissyand\\'e, Yves Le Traon","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","title":"An Investigation into the Use of Common Libraries in Android Apps"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.06554","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d99d7d9ace93e8193ef69d1563da736017d47d28b4ecd3be7306e424cd89fe6b","target":"record","created_at":"2026-05-18T01:26:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0f85e906627da05019d1f38e7bbcbe5326f3f38c66d3265cebfed971180ea709","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","title_canon_sha256":"96f86a21173ca3ef1bebcc87ef11c60718c3e08a7884468282b44836d0ed95ea"},"schema_version":"1.0","source":{"id":"1511.06554","kind":"arxiv","version":1}},"canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","first_computed_at":"2026-05-18T01:26:24.285648Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:26:24.285648Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"sPjk9eZtUxcOW30sQH1lAwBFJACON6KB8MnED779YSaJzk+fRnW+Sbnd+/8mK0cpJBFH0EfeA+7hU014LZMUAA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:26:24.286151Z","signed_message":"canonical_sha256_bytes"},"source_id":"1511.06554","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d99d7d9ace93e8193ef69d1563da736017d47d28b4ecd3be7306e424cd89fe6b","sha256:fc5c4e01d1d312440ed266f3c03612349c661455219e7444eb333ec56fcb0a6f"],"state_sha256":"8b11fbadd33cddbe0e2bdba91a47d24b378a075d6895ed6ebc6f58b399c2c995"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"K8u+TwQzOPE8YbCroBwtU5R7F2K7MA0fNLRiPHyEgPc+fhBxWRtkNp79mCPpDJ6tkoRg1rLKm9r8sVyzAbV5CA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T15:16:03.482672Z","bundle_sha256":"18f22a31ad3378f728b8db04f2d8d68bd9e0b80dabbd48a874b70b24c9c14e4c"}}