{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:4RDDPLSPH27MGXPMJSWITVD6EY","short_pith_number":"pith:4RDDPLSP","canonical_record":{"source":{"id":"1803.11021","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-29T12:08:59Z","cross_cats_sorted":[],"title_canon_sha256":"5978fe9ba19c280a96b7513b7029d6277b64376fcf86c2ca6d664ba1c7d51364","abstract_canon_sha256":"c7cce422938bacf33f5165f581213bb55ed2d18a4f8e02f715f19721f0dfc1c9"},"schema_version":"1.0"},"canonical_sha256":"e44637ae4f3ebec35dec4cac89d47e2608e984519856cf065c82f4ca22a6733a","source":{"kind":"arxiv","id":"1803.11021","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.11021","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"arxiv_version","alias_value":"1803.11021v1","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.11021","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"pith_short_12","alias_value":"4RDDPLSPH27M","created_at":"2026-05-18T12:32:05Z"},{"alias_kind":"pith_short_16","alias_value":"4RDDPLSPH27MGXPM","created_at":"2026-05-18T12:32:05Z"},{"alias_kind":"pith_short_8","alias_value":"4RDDPLSP","created_at":"2026-05-18T12:32:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:4RDDPLSPH27MGXPMJSWITVD6EY","target":"record","payload":{"canonical_record":{"source":{"id":"1803.11021","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-29T12:08:59Z","cross_cats_sorted":[],"title_canon_sha256":"5978fe9ba19c280a96b7513b7029d6277b64376fcf86c2ca6d664ba1c7d51364","abstract_canon_sha256":"c7cce422938bacf33f5165f581213bb55ed2d18a4f8e02f715f19721f0dfc1c9"},"schema_version":"1.0"},"canonical_sha256":"e44637ae4f3ebec35dec4cac89d47e2608e984519856cf065c82f4ca22a6733a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:04:13.098855Z","signature_b64":"3khGXffDc4y3PYuSuqbpEcX7NkBKRjQfQr3S79EZm+fR3gp78LUCJKr5FKg6IVq+axwSHhDf7TJrKU2ThTbaAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e44637ae4f3ebec35dec4cac89d47e2608e984519856cf065c82f4ca22a6733a","last_reissued_at":"2026-05-18T00:04:13.098067Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:04:13.098067Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.11021","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:04:13Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"50vXka60vaBlgOMnfE2OtFJnNQotkFicXCyloNbvgqL2447s5bE7T73ueO8z8gA1R95p5kDmJQTLbVEHn+9/CA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T20:53:50.385455Z"},"content_sha256":"eac36a840ad6d20572b17d8057578f08ec92a80b12cec8a1ae03b36b128b75f0","schema_version":"1.0","event_id":"sha256:eac36a840ad6d20572b17d8057578f08ec92a80b12cec8a1ae03b36b128b75f0"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:4RDDPLSPH27MGXPMJSWITVD6EY","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Migrating SGX Enclaves with Persistent State","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Andrew Paverd, Arseny Kurnikov, Fritz Alder, N. Asokan","submitted_at":"2018-03-29T12:08:59Z","abstract_excerpt":"Hardware-supported security mechanisms like Intel Software Guard Extensions (SGX) provide strong security guarantees, which are particularly relevant in cloud settings. However, their reliance on physical hardware conflicts with cloud practices, like migration of VMs between physical platforms. For instance, the SGX trusted execution environment (enclave) is bound to a single physical CPU.\n  Although prior work has proposed an effective mechanism to migrate an enclave's data memory, it overlooks the migration of persistent state, including sealed data and monotonic counters; the former risks d"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.11021","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:04:13Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"jSyYW2jqaJ2yF/2NzhfwvOWtdv7e4nF6/QfJw2cdMIlF1DFtt9Wqdlmj77UaVN6/t7e9FbJc8Dn+jp5mpG5WCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T20:53:50.385798Z"},"content_sha256":"0bae8de6aa46f4d8b3b002a63b966b7e820adf3f0af40088901e97c3f4b63ac4","schema_version":"1.0","event_id":"sha256:0bae8de6aa46f4d8b3b002a63b966b7e820adf3f0af40088901e97c3f4b63ac4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/4RDDPLSPH27MGXPMJSWITVD6EY/bundle.json","state_url":"https://pith.science/pith/4RDDPLSPH27MGXPMJSWITVD6EY/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/4RDDPLSPH27MGXPMJSWITVD6EY/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T20:53:50Z","links":{"resolver":"https://pith.science/pith/4RDDPLSPH27MGXPMJSWITVD6EY","bundle":"https://pith.science/pith/4RDDPLSPH27MGXPMJSWITVD6EY/bundle.json","state":"https://pith.science/pith/4RDDPLSPH27MGXPMJSWITVD6EY/state.json","well_known_bundle":"https://pith.science/.well-known/pith/4RDDPLSPH27MGXPMJSWITVD6EY/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:4RDDPLSPH27MGXPMJSWITVD6EY","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c7cce422938bacf33f5165f581213bb55ed2d18a4f8e02f715f19721f0dfc1c9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-29T12:08:59Z","title_canon_sha256":"5978fe9ba19c280a96b7513b7029d6277b64376fcf86c2ca6d664ba1c7d51364"},"schema_version":"1.0","source":{"id":"1803.11021","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.11021","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"arxiv_version","alias_value":"1803.11021v1","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.11021","created_at":"2026-05-18T00:04:13Z"},{"alias_kind":"pith_short_12","alias_value":"4RDDPLSPH27M","created_at":"2026-05-18T12:32:05Z"},{"alias_kind":"pith_short_16","alias_value":"4RDDPLSPH27MGXPM","created_at":"2026-05-18T12:32:05Z"},{"alias_kind":"pith_short_8","alias_value":"4RDDPLSP","created_at":"2026-05-18T12:32:05Z"}],"graph_snapshots":[{"event_id":"sha256:0bae8de6aa46f4d8b3b002a63b966b7e820adf3f0af40088901e97c3f4b63ac4","target":"graph","created_at":"2026-05-18T00:04:13Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Hardware-supported security mechanisms like Intel Software Guard Extensions (SGX) provide strong security guarantees, which are particularly relevant in cloud settings. However, their reliance on physical hardware conflicts with cloud practices, like migration of VMs between physical platforms. For instance, the SGX trusted execution environment (enclave) is bound to a single physical CPU.\n  Although prior work has proposed an effective mechanism to migrate an enclave's data memory, it overlooks the migration of persistent state, including sealed data and monotonic counters; the former risks d","authors_text":"Andrew Paverd, Arseny Kurnikov, Fritz Alder, N. Asokan","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-29T12:08:59Z","title":"Migrating SGX Enclaves with Persistent State"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.11021","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:eac36a840ad6d20572b17d8057578f08ec92a80b12cec8a1ae03b36b128b75f0","target":"record","created_at":"2026-05-18T00:04:13Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c7cce422938bacf33f5165f581213bb55ed2d18a4f8e02f715f19721f0dfc1c9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-29T12:08:59Z","title_canon_sha256":"5978fe9ba19c280a96b7513b7029d6277b64376fcf86c2ca6d664ba1c7d51364"},"schema_version":"1.0","source":{"id":"1803.11021","kind":"arxiv","version":1}},"canonical_sha256":"e44637ae4f3ebec35dec4cac89d47e2608e984519856cf065c82f4ca22a6733a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e44637ae4f3ebec35dec4cac89d47e2608e984519856cf065c82f4ca22a6733a","first_computed_at":"2026-05-18T00:04:13.098067Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:04:13.098067Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"3khGXffDc4y3PYuSuqbpEcX7NkBKRjQfQr3S79EZm+fR3gp78LUCJKr5FKg6IVq+axwSHhDf7TJrKU2ThTbaAQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:04:13.098855Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.11021","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:eac36a840ad6d20572b17d8057578f08ec92a80b12cec8a1ae03b36b128b75f0","sha256:0bae8de6aa46f4d8b3b002a63b966b7e820adf3f0af40088901e97c3f4b63ac4"],"state_sha256":"62c051586810ce8b900e25596f02c695a9403d4fdc24580ad8f01a559750fe43"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"P06skFGfUfXKSZpsDRm/AnxdfdPJvbifLdJjQcKZsksK1k0ql9/gdjxs12UCn/IAX8LMyyAxqegLOlJMRLs8Aw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T20:53:50.387675Z","bundle_sha256":"74e4cc7741fda6134534c51c35a08969048630ec07502d926f76a4616e1f6451"}}