{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:BY2N6HFXY6XSMTTJM2UHQOY4ZG","short_pith_number":"pith:BY2N6HFX","canonical_record":{"source":{"id":"1803.08359","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-22T13:56:00Z","cross_cats_sorted":[],"title_canon_sha256":"83c49a681841a960f30219ed66d32d532b5bc12071b15fd48902c7626d79080a","abstract_canon_sha256":"5f5c93bc0ed3501936185a90cecf30a380a0cd40e02a60e2998ae45b7fce7bba"},"schema_version":"1.0"},"canonical_sha256":"0e34df1cb7c7af264e6966a8783b1cc9ae25fe496efd3b4ffa2e1ef7ec65bc14","source":{"kind":"arxiv","id":"1803.08359","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.08359","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"arxiv_version","alias_value":"1803.08359v1","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.08359","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"pith_short_12","alias_value":"BY2N6HFXY6XS","created_at":"2026-05-18T12:32:16Z"},{"alias_kind":"pith_short_16","alias_value":"BY2N6HFXY6XSMTTJ","created_at":"2026-05-18T12:32:16Z"},{"alias_kind":"pith_short_8","alias_value":"BY2N6HFX","created_at":"2026-05-18T12:32:16Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:BY2N6HFXY6XSMTTJM2UHQOY4ZG","target":"record","payload":{"canonical_record":{"source":{"id":"1803.08359","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-22T13:56:00Z","cross_cats_sorted":[],"title_canon_sha256":"83c49a681841a960f30219ed66d32d532b5bc12071b15fd48902c7626d79080a","abstract_canon_sha256":"5f5c93bc0ed3501936185a90cecf30a380a0cd40e02a60e2998ae45b7fce7bba"},"schema_version":"1.0"},"canonical_sha256":"0e34df1cb7c7af264e6966a8783b1cc9ae25fe496efd3b4ffa2e1ef7ec65bc14","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:20:23.061135Z","signature_b64":"WeQ9yr/nu24McuVYZA5Zr7MzdPSSNF/0wbCNTb0l77mhbnU8FKTfBLjdAqb2t2O2DSbbsjjbzBoJ7cqyvyOnAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0e34df1cb7c7af264e6966a8783b1cc9ae25fe496efd3b4ffa2e1ef7ec65bc14","last_reissued_at":"2026-05-18T00:20:23.060708Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:20:23.060708Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.08359","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+KdAJIZWy3kpBUVv9fAtSVbRic3uMU6m9H4srsq/Wrr94Oz/RSBT/Fu2d1G9nORfqriFEFDngi3Xp7qzK76jCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T19:04:37.390741Z"},"content_sha256":"2d27daa7a6335a003eee59ef6efa1e3d092dd12e4c56f03d4d237cd8dba80d66","schema_version":"1.0","event_id":"sha256:2d27daa7a6335a003eee59ef6efa1e3d092dd12e4c56f03d4d237cd8dba80d66"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:BY2N6HFXY6XSMTTJM2UHQOY4ZG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Securing Conditional Branches in the Presence of Fault Attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Mario Werner, Robert Schilling, Stefan Mangard","submitted_at":"2018-03-22T13:56:00Z","abstract_excerpt":"In typical software, many comparisons and subsequent branch operations are highly critical in terms of security. Examples include password checks, signature checks, secure boot, and user privilege checks. For embedded devices, these security-critical branches are a preferred target of fault attacks as a single bit flip or skipping a single instruction can lead to complete access to a system. In the past, numerous redundancy schemes have been proposed in order to provide control-flow-integrity (CFI) and to enable error detection on processed data. However, current countermeasures for general pu"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.08359","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:20:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TSByrkS7p+jwgFDYCZqvCCTFFF3C7oKUxdcr14oWpowv3OU1dQiFD8CIDo6UXV2lEckfpZwsw2AsiE56uJ9zBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T19:04:37.391086Z"},"content_sha256":"1025fe5876b07abd70bd4e7e201c653774c8390efeaf504a29a6484140b4c5ea","schema_version":"1.0","event_id":"sha256:1025fe5876b07abd70bd4e7e201c653774c8390efeaf504a29a6484140b4c5ea"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/bundle.json","state_url":"https://pith.science/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T19:04:37Z","links":{"resolver":"https://pith.science/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG","bundle":"https://pith.science/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/bundle.json","state":"https://pith.science/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/BY2N6HFXY6XSMTTJM2UHQOY4ZG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:BY2N6HFXY6XSMTTJM2UHQOY4ZG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"5f5c93bc0ed3501936185a90cecf30a380a0cd40e02a60e2998ae45b7fce7bba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-22T13:56:00Z","title_canon_sha256":"83c49a681841a960f30219ed66d32d532b5bc12071b15fd48902c7626d79080a"},"schema_version":"1.0","source":{"id":"1803.08359","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.08359","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"arxiv_version","alias_value":"1803.08359v1","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.08359","created_at":"2026-05-18T00:20:23Z"},{"alias_kind":"pith_short_12","alias_value":"BY2N6HFXY6XS","created_at":"2026-05-18T12:32:16Z"},{"alias_kind":"pith_short_16","alias_value":"BY2N6HFXY6XSMTTJ","created_at":"2026-05-18T12:32:16Z"},{"alias_kind":"pith_short_8","alias_value":"BY2N6HFX","created_at":"2026-05-18T12:32:16Z"}],"graph_snapshots":[{"event_id":"sha256:1025fe5876b07abd70bd4e7e201c653774c8390efeaf504a29a6484140b4c5ea","target":"graph","created_at":"2026-05-18T00:20:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In typical software, many comparisons and subsequent branch operations are highly critical in terms of security. Examples include password checks, signature checks, secure boot, and user privilege checks. For embedded devices, these security-critical branches are a preferred target of fault attacks as a single bit flip or skipping a single instruction can lead to complete access to a system. In the past, numerous redundancy schemes have been proposed in order to provide control-flow-integrity (CFI) and to enable error detection on processed data. However, current countermeasures for general pu","authors_text":"Mario Werner, Robert Schilling, Stefan Mangard","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-22T13:56:00Z","title":"Securing Conditional Branches in the Presence of Fault Attacks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.08359","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2d27daa7a6335a003eee59ef6efa1e3d092dd12e4c56f03d4d237cd8dba80d66","target":"record","created_at":"2026-05-18T00:20:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"5f5c93bc0ed3501936185a90cecf30a380a0cd40e02a60e2998ae45b7fce7bba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-03-22T13:56:00Z","title_canon_sha256":"83c49a681841a960f30219ed66d32d532b5bc12071b15fd48902c7626d79080a"},"schema_version":"1.0","source":{"id":"1803.08359","kind":"arxiv","version":1}},"canonical_sha256":"0e34df1cb7c7af264e6966a8783b1cc9ae25fe496efd3b4ffa2e1ef7ec65bc14","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"0e34df1cb7c7af264e6966a8783b1cc9ae25fe496efd3b4ffa2e1ef7ec65bc14","first_computed_at":"2026-05-18T00:20:23.060708Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:20:23.060708Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"WeQ9yr/nu24McuVYZA5Zr7MzdPSSNF/0wbCNTb0l77mhbnU8FKTfBLjdAqb2t2O2DSbbsjjbzBoJ7cqyvyOnAA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:20:23.061135Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.08359","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2d27daa7a6335a003eee59ef6efa1e3d092dd12e4c56f03d4d237cd8dba80d66","sha256:1025fe5876b07abd70bd4e7e201c653774c8390efeaf504a29a6484140b4c5ea"],"state_sha256":"30dc61d34f881f6d398972029d7275969dc78143823ec7893cc073211c9a29ea"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"UyqpQOvL60s+7TqmslaOMQpoNYNItFkosZ8QNgARoDYlQFxcDDc3KCmp1wjtjSRR0Wm2Mazi5ab4eoOL++NpCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T19:04:37.393243Z","bundle_sha256":"e313134f66d0b4f325ea25456a2467e1c10817ec184413774f07f6a38525b6ee"}}