{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:CAUSBLGDWG5A5NICLBFQY5HUNQ","short_pith_number":"pith:CAUSBLGD","canonical_record":{"source":{"id":"1511.08756","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-27T17:45:57Z","cross_cats_sorted":[],"title_canon_sha256":"00a795e3edba429cdeea2c6588df045fc9526aadbfc18276c8d3bace8753b8be","abstract_canon_sha256":"9ed2f1f839ca85a16f82d62d4602d7bc269ed8c128429ab16b765cdecc46a55c"},"schema_version":"1.0"},"canonical_sha256":"102920acc3b1ba0eb502584b0c74f46c03ea4b9024ca7adfcb71967a09bad9c1","source":{"kind":"arxiv","id":"1511.08756","version":4},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.08756","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"arxiv_version","alias_value":"1511.08756v4","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.08756","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"pith_short_12","alias_value":"CAUSBLGDWG5A","created_at":"2026-05-18T12:29:14Z"},{"alias_kind":"pith_short_16","alias_value":"CAUSBLGDWG5A5NIC","created_at":"2026-05-18T12:29:14Z"},{"alias_kind":"pith_short_8","alias_value":"CAUSBLGD","created_at":"2026-05-18T12:29:14Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:CAUSBLGDWG5A5NICLBFQY5HUNQ","target":"record","payload":{"canonical_record":{"source":{"id":"1511.08756","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-27T17:45:57Z","cross_cats_sorted":[],"title_canon_sha256":"00a795e3edba429cdeea2c6588df045fc9526aadbfc18276c8d3bace8753b8be","abstract_canon_sha256":"9ed2f1f839ca85a16f82d62d4602d7bc269ed8c128429ab16b765cdecc46a55c"},"schema_version":"1.0"},"canonical_sha256":"102920acc3b1ba0eb502584b0c74f46c03ea4b9024ca7adfcb71967a09bad9c1","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:11:50.114581Z","signature_b64":"NAVRCBfkONLFruU1TTzOsKyL6UsDLcHQe4qoMoNJVV6fdcNGtw0rpuqhyaC6es9v81vIjtvR5hdMEHV3a8ZtBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"102920acc3b1ba0eb502584b0c74f46c03ea4b9024ca7adfcb71967a09bad9c1","last_reissued_at":"2026-05-18T01:11:50.114153Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:11:50.114153Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1511.08756","source_version":4,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:11:50Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"oouXrjk29lbmxP9R9cXtEjkj97FEnM3tR4Hgq34/7u11TCjlnjPWcvYZ6HileGpsqETWMO+1OQw4gvqByFEQBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:37:44.265777Z"},"content_sha256":"f47ccbd713217aca3a8f450ef292cf3183fcf5d3f22a6799d113d6fa09428b21","schema_version":"1.0","event_id":"sha256:f47ccbd713217aca3a8f450ef292cf3183fcf5d3f22a6799d113d6fa09428b21"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:CAUSBLGDWG5A5NICLBFQY5HUNQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Cl\\'ementine Maurice, Daniel Gruss, Michael Schwarz, Peter Pessl, Stefan Mangard","submitted_at":"2015-11-27T17:45:57Z","abstract_excerpt":"In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the CPU cache or memory bus, can leak sensitive information. For security reasons, shared memory between tenants is typically disabled. Furthermore, tenants often do not share a physical CPU. In this setting, cache attacks do not work and only a slow cross-CPU covert channel over the memory bus is known. In contrast, we demonstrate a high-speed covert"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.08756","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:11:50Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Fr5lof0xNj0qglDcfBk3tLbp4DAFPXW6w9lIM+V2SNkWgClIDYrBSDE44YNmbQMy1jVbK37sVW7sGxNn2kGmAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:37:44.266530Z"},"content_sha256":"26c921b2a73ce14c31bebcbf5050571a73864b6f5f5097e73e314e8514ec3375","schema_version":"1.0","event_id":"sha256:26c921b2a73ce14c31bebcbf5050571a73864b6f5f5097e73e314e8514ec3375"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/bundle.json","state_url":"https://pith.science/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T11:37:44Z","links":{"resolver":"https://pith.science/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ","bundle":"https://pith.science/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/bundle.json","state":"https://pith.science/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CAUSBLGDWG5A5NICLBFQY5HUNQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:CAUSBLGDWG5A5NICLBFQY5HUNQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9ed2f1f839ca85a16f82d62d4602d7bc269ed8c128429ab16b765cdecc46a55c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-27T17:45:57Z","title_canon_sha256":"00a795e3edba429cdeea2c6588df045fc9526aadbfc18276c8d3bace8753b8be"},"schema_version":"1.0","source":{"id":"1511.08756","kind":"arxiv","version":4}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1511.08756","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"arxiv_version","alias_value":"1511.08756v4","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.08756","created_at":"2026-05-18T01:11:50Z"},{"alias_kind":"pith_short_12","alias_value":"CAUSBLGDWG5A","created_at":"2026-05-18T12:29:14Z"},{"alias_kind":"pith_short_16","alias_value":"CAUSBLGDWG5A5NIC","created_at":"2026-05-18T12:29:14Z"},{"alias_kind":"pith_short_8","alias_value":"CAUSBLGD","created_at":"2026-05-18T12:29:14Z"}],"graph_snapshots":[{"event_id":"sha256:26c921b2a73ce14c31bebcbf5050571a73864b6f5f5097e73e314e8514ec3375","target":"graph","created_at":"2026-05-18T01:11:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the CPU cache or memory bus, can leak sensitive information. For security reasons, shared memory between tenants is typically disabled. Furthermore, tenants often do not share a physical CPU. In this setting, cache attacks do not work and only a slow cross-CPU covert channel over the memory bus is known. In contrast, we demonstrate a high-speed covert","authors_text":"Cl\\'ementine Maurice, Daniel Gruss, Michael Schwarz, Peter Pessl, Stefan Mangard","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-27T17:45:57Z","title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.08756","kind":"arxiv","version":4},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f47ccbd713217aca3a8f450ef292cf3183fcf5d3f22a6799d113d6fa09428b21","target":"record","created_at":"2026-05-18T01:11:50Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9ed2f1f839ca85a16f82d62d4602d7bc269ed8c128429ab16b765cdecc46a55c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-11-27T17:45:57Z","title_canon_sha256":"00a795e3edba429cdeea2c6588df045fc9526aadbfc18276c8d3bace8753b8be"},"schema_version":"1.0","source":{"id":"1511.08756","kind":"arxiv","version":4}},"canonical_sha256":"102920acc3b1ba0eb502584b0c74f46c03ea4b9024ca7adfcb71967a09bad9c1","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"102920acc3b1ba0eb502584b0c74f46c03ea4b9024ca7adfcb71967a09bad9c1","first_computed_at":"2026-05-18T01:11:50.114153Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:11:50.114153Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"NAVRCBfkONLFruU1TTzOsKyL6UsDLcHQe4qoMoNJVV6fdcNGtw0rpuqhyaC6es9v81vIjtvR5hdMEHV3a8ZtBw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:11:50.114581Z","signed_message":"canonical_sha256_bytes"},"source_id":"1511.08756","source_kind":"arxiv","source_version":4}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f47ccbd713217aca3a8f450ef292cf3183fcf5d3f22a6799d113d6fa09428b21","sha256:26c921b2a73ce14c31bebcbf5050571a73864b6f5f5097e73e314e8514ec3375"],"state_sha256":"abf38dcc4cad524ffd03b28e2c480b54c8a8c5069ce0c64180d3107be57ee437"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2SVFK8m+bj5DACDfcv/nllFGCeXmsfskaMpNCcnP9B4QYzX8werU7kwGE96JIUqwd5mUhnEKCtir0efHt3KsAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T11:37:44.270445Z","bundle_sha256":"8597b8053817a388e70cbcdfd3b7720e74d4c37e9d99672bb5dd658da730b631"}}