{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:BFVQS2NTJEEORAXUHRZKPPQO2C","short_pith_number":"pith:BFVQS2NT","canonical_record":{"source":{"id":"1703.01537","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-03-04T23:58:05Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"a229b526257550f498de9495a25867b7e6f4b72a48a934b9472b572f649ad7f4","abstract_canon_sha256":"186b93abb7d884bf8e4fd87b0ea6f3b28ebd3bee09a5fda84dc313df7c1d1e68"},"schema_version":"1.0"},"canonical_sha256":"096b0969b34908e882f43c72a7be0ed0b94697834942f90d04897b0371ae62a0","source":{"kind":"arxiv","id":"1703.01537","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.01537","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"arxiv_version","alias_value":"1703.01537v2","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.01537","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"pith_short_12","alias_value":"BFVQS2NTJEEO","created_at":"2026-05-18T12:31:08Z"},{"alias_kind":"pith_short_16","alias_value":"BFVQS2NTJEEORAXU","created_at":"2026-05-18T12:31:08Z"},{"alias_kind":"pith_short_8","alias_value":"BFVQS2NT","created_at":"2026-05-18T12:31:08Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:BFVQS2NTJEEORAXUHRZKPPQO2C","target":"record","payload":{"canonical_record":{"source":{"id":"1703.01537","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-03-04T23:58:05Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"a229b526257550f498de9495a25867b7e6f4b72a48a934b9472b572f649ad7f4","abstract_canon_sha256":"186b93abb7d884bf8e4fd87b0ea6f3b28ebd3bee09a5fda84dc313df7c1d1e68"},"schema_version":"1.0"},"canonical_sha256":"096b0969b34908e882f43c72a7be0ed0b94697834942f90d04897b0371ae62a0","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:49:20.832378Z","signature_b64":"SmJOueLjA2d9g/RyUgJ5G3z+bKZGDZUu9DQykGTD/uL2toTCMuUZvAGxy7OfIMGpijy+/qu4WlDY0obxByK6AQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"096b0969b34908e882f43c72a7be0ed0b94697834942f90d04897b0371ae62a0","last_reissued_at":"2026-05-18T00:49:20.831800Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:49:20.831800Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1703.01537","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:49:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"F58fDRnRhOtTu5CdqoRhkCajxBVkEApCSBZ1I3F4H/CzGZGRVJ/48MASi2NVdPyCfcvHg4NwfBpEG64nhgZTBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T01:13:59.535202Z"},"content_sha256":"cccc58e4f7e9d1046650be7b17e48c0a8b18edbaea07f7be0fd6395e7275de4d","schema_version":"1.0","event_id":"sha256:cccc58e4f7e9d1046650be7b17e48c0a8b18edbaea07f7be0fd6395e7275de4d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:BFVQS2NTJEEORAXUHRZKPPQO2C","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.NI"],"primary_cat":"cs.CR","authors_text":"Carl Gunter, Michael Grace, Nan Zhang, Soteris Demetriou, Xiaofeng Wang, Xiaoyong Zhou, Yeonjoon Lee","submitted_at":"2017-03-04T23:58:05Z","abstract_excerpt":"A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). Those systems tend to rely on the Wi-Fi router to authenticate other devices; as verified in our study, IoT vendors tend to trust all devices connected to the HAN. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which the router does not have information to control, as confirmed in our measurement study. Mitigating this threat cannot solely rely on IoT manufacturers, which may need to change the hardware on the de"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.01537","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:49:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"40+YkJd+nq/aLQcouOovpJpXeX2FCU66+OXvashCfOL2K4KjpbRn3oTFTBkSZq0+1n/D8sjgVmzjHd8n/0piCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T01:13:59.535881Z"},"content_sha256":"dd559e4ad8ef6f2daf903236f303d28e8f9f3a9ff3421c03c0f34f16bada46e1","schema_version":"1.0","event_id":"sha256:dd559e4ad8ef6f2daf903236f303d28e8f9f3a9ff3421c03c0f34f16bada46e1"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/bundle.json","state_url":"https://pith.science/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T01:13:59Z","links":{"resolver":"https://pith.science/pith/BFVQS2NTJEEORAXUHRZKPPQO2C","bundle":"https://pith.science/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/bundle.json","state":"https://pith.science/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/state.json","well_known_bundle":"https://pith.science/.well-known/pith/BFVQS2NTJEEORAXUHRZKPPQO2C/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:BFVQS2NTJEEORAXUHRZKPPQO2C","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"186b93abb7d884bf8e4fd87b0ea6f3b28ebd3bee09a5fda84dc313df7c1d1e68","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-03-04T23:58:05Z","title_canon_sha256":"a229b526257550f498de9495a25867b7e6f4b72a48a934b9472b572f649ad7f4"},"schema_version":"1.0","source":{"id":"1703.01537","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1703.01537","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"arxiv_version","alias_value":"1703.01537v2","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.01537","created_at":"2026-05-18T00:49:20Z"},{"alias_kind":"pith_short_12","alias_value":"BFVQS2NTJEEO","created_at":"2026-05-18T12:31:08Z"},{"alias_kind":"pith_short_16","alias_value":"BFVQS2NTJEEORAXU","created_at":"2026-05-18T12:31:08Z"},{"alias_kind":"pith_short_8","alias_value":"BFVQS2NT","created_at":"2026-05-18T12:31:08Z"}],"graph_snapshots":[{"event_id":"sha256:dd559e4ad8ef6f2daf903236f303d28e8f9f3a9ff3421c03c0f34f16bada46e1","target":"graph","created_at":"2026-05-18T00:49:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"A new development of smart-home systems is to use mobile apps to control IoT devices across a Home Area Network (HAN). Those systems tend to rely on the Wi-Fi router to authenticate other devices; as verified in our study, IoT vendors tend to trust all devices connected to the HAN. This treatment exposes them to the attack from malicious apps, particularly those running on authorized phones, which the router does not have information to control, as confirmed in our measurement study. Mitigating this threat cannot solely rely on IoT manufacturers, which may need to change the hardware on the de","authors_text":"Carl Gunter, Michael Grace, Nan Zhang, Soteris Demetriou, Xiaofeng Wang, Xiaoyong Zhou, Yeonjoon Lee","cross_cats":["cs.NI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-03-04T23:58:05Z","title":"Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.01537","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:cccc58e4f7e9d1046650be7b17e48c0a8b18edbaea07f7be0fd6395e7275de4d","target":"record","created_at":"2026-05-18T00:49:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"186b93abb7d884bf8e4fd87b0ea6f3b28ebd3bee09a5fda84dc313df7c1d1e68","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-03-04T23:58:05Z","title_canon_sha256":"a229b526257550f498de9495a25867b7e6f4b72a48a934b9472b572f649ad7f4"},"schema_version":"1.0","source":{"id":"1703.01537","kind":"arxiv","version":2}},"canonical_sha256":"096b0969b34908e882f43c72a7be0ed0b94697834942f90d04897b0371ae62a0","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"096b0969b34908e882f43c72a7be0ed0b94697834942f90d04897b0371ae62a0","first_computed_at":"2026-05-18T00:49:20.831800Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:49:20.831800Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"SmJOueLjA2d9g/RyUgJ5G3z+bKZGDZUu9DQykGTD/uL2toTCMuUZvAGxy7OfIMGpijy+/qu4WlDY0obxByK6AQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:49:20.832378Z","signed_message":"canonical_sha256_bytes"},"source_id":"1703.01537","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:cccc58e4f7e9d1046650be7b17e48c0a8b18edbaea07f7be0fd6395e7275de4d","sha256:dd559e4ad8ef6f2daf903236f303d28e8f9f3a9ff3421c03c0f34f16bada46e1"],"state_sha256":"4f0ddf0844dac5c62ee014e2964aab9e8968a2704097c31a84d7c9dfc0571221"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"z6r9FyCEwEMYmyQWEbA8g7RCms8CbM25BNE4apL6Ld1Xj5+8S1RdSWuRArJGzXEdCzo6S5MPfwOiERfH5y9VBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T01:13:59.539409Z","bundle_sha256":"efe69ee1204adebe5ed984e819d79c3d529f7ae6037c727fe7b7e48f6202b2b7"}}