{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:BXBXELRUQLVLYTI32BN4P2ABQA","short_pith_number":"pith:BXBXELRU","schema_version":"1.0","canonical_sha256":"0dc3722e3482eabc4d1bd05bc7e8018008d9a98e1a80a8a5415212a20cd29f93","source":{"kind":"arxiv","id":"1803.07211","version":3},"attestation_state":"computed","paper":{"title":"DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Claudio Soriente, Hien Thi Thu Truong, Juhani Toivonen, N. Asokan, Sasu Tarkoma, Thien Duc Nguyen","submitted_at":"2018-03-20T01:19:07Z","abstract_excerpt":"Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1803.07211","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-20T01:19:07Z","cross_cats_sorted":[],"title_canon_sha256":"9692bdb32960c7bf3b377a0ea5068c6c9bbeb7de7afa5c3493ab81782a883c3a","abstract_canon_sha256":"1054fc6327660ad2cde5f345333eca7ac902e3621368f8058e1d47e30e2842ee"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:53:51.532530Z","signature_b64":"xC2PiP0GC8SNr6/oNbYPiBMprZbI7gSfyRVqJvlXqJFVTZtc7hxDbKh39BEUfHBMSHiPcGRU5XYg+XgRFq28DQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0dc3722e3482eabc4d1bd05bc7e8018008d9a98e1a80a8a5415212a20cd29f93","last_reissued_at":"2026-05-17T23:53:51.531796Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:53:51.531796Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Claudio Soriente, Hien Thi Thu Truong, Juhani Toivonen, N. Asokan, Sasu Tarkoma, Thien Duc Nguyen","submitted_at":"2018-03-20T01:19:07Z","abstract_excerpt":"Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.07211","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1803.07211","created_at":"2026-05-17T23:53:51.531908+00:00"},{"alias_kind":"arxiv_version","alias_value":"1803.07211v3","created_at":"2026-05-17T23:53:51.531908+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.07211","created_at":"2026-05-17T23:53:51.531908+00:00"},{"alias_kind":"pith_short_12","alias_value":"BXBXELRUQLVL","created_at":"2026-05-18T12:32:16.446611+00:00"},{"alias_kind":"pith_short_16","alias_value":"BXBXELRUQLVLYTI3","created_at":"2026-05-18T12:32:16.446611+00:00"},{"alias_kind":"pith_short_8","alias_value":"BXBXELRU","created_at":"2026-05-18T12:32:16.446611+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA","json":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA.json","graph_json":"https://pith.science/api/pith-number/BXBXELRUQLVLYTI32BN4P2ABQA/graph.json","events_json":"https://pith.science/api/pith-number/BXBXELRUQLVLYTI32BN4P2ABQA/events.json","paper":"https://pith.science/paper/BXBXELRU"},"agent_actions":{"view_html":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA","download_json":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA.json","view_paper":"https://pith.science/paper/BXBXELRU","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1803.07211&json=true","fetch_graph":"https://pith.science/api/pith-number/BXBXELRUQLVLYTI32BN4P2ABQA/graph.json","fetch_events":"https://pith.science/api/pith-number/BXBXELRUQLVLYTI32BN4P2ABQA/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA/action/timestamp_anchor","attest_storage":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA/action/storage_attestation","attest_author":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA/action/author_attestation","sign_citation":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA/action/citation_signature","submit_replication":"https://pith.science/pith/BXBXELRUQLVLYTI32BN4P2ABQA/action/replication_record"}},"created_at":"2026-05-17T23:53:51.531908+00:00","updated_at":"2026-05-17T23:53:51.531908+00:00"}