{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:CBG6BFOND543VEJJ3HPCCWRR32","short_pith_number":"pith:CBG6BFON","canonical_record":{"source":{"id":"2605.16167","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T16:46:23Z","cross_cats_sorted":["cs.CY","cs.DC","cs.SE"],"title_canon_sha256":"51245a36816913ba88c4b2f80af5585f69a3c6e178f84ec8e13d250876b09797","abstract_canon_sha256":"6e55fb6c6a1b28dcedb7558f7fd87660ea686c2597f6bced30ea69b29ee080ae"},"schema_version":"1.0"},"canonical_sha256":"104de095cd1f79ba9129d9de215a31de8df110164a308a7f221d7a54ad366f02","source":{"kind":"arxiv","id":"2605.16167","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.16167","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"arxiv_version","alias_value":"2605.16167v1","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.16167","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_12","alias_value":"CBG6BFOND543","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_16","alias_value":"CBG6BFOND543VEJJ","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_8","alias_value":"CBG6BFON","created_at":"2026-05-20T00:01:55Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:CBG6BFOND543VEJJ3HPCCWRR32","target":"record","payload":{"canonical_record":{"source":{"id":"2605.16167","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T16:46:23Z","cross_cats_sorted":["cs.CY","cs.DC","cs.SE"],"title_canon_sha256":"51245a36816913ba88c4b2f80af5585f69a3c6e178f84ec8e13d250876b09797","abstract_canon_sha256":"6e55fb6c6a1b28dcedb7558f7fd87660ea686c2597f6bced30ea69b29ee080ae"},"schema_version":"1.0"},"canonical_sha256":"104de095cd1f79ba9129d9de215a31de8df110164a308a7f221d7a54ad366f02","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:01:55.885548Z","signature_b64":"lLtbG/oFu00JAieqKszj/CTS35XsoFoo/f0KFMAqc5BXW1ePtzVTxYVB3Zd1Kin5RvzsqF8CYfyeGkT8dbpXBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"104de095cd1f79ba9129d9de215a31de8df110164a308a7f221d7a54ad366f02","last_reissued_at":"2026-05-20T00:01:55.884704Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:01:55.884704Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.16167","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"YVmv11MEWYqqczA5WoA5UU9G0vnpzwz4sGeDQcuvBoUqOKAZC4rc6xdx448yxxBjuFcUralbE2vPTeutK9T0DQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T20:28:24.972131Z"},"content_sha256":"4b0d8c0ac0fd87dbfd709ab8b2123da03511e0bf8a7496a59873f0e0369b6f15","schema_version":"1.0","event_id":"sha256:4b0d8c0ac0fd87dbfd709ab8b2123da03511e0bf8a7496a59873f0e0369b6f15"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:CBG6BFOND543VEJJ3HPCCWRR32","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"From Backup Restoration to Minimum Viable Factory Recovery: A Systematization of Ransomware Recovery in Manufacturing Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY","cs.DC","cs.SE"],"primary_cat":"cs.CR","authors_text":"Chun Yin Chiu","submitted_at":"2026-05-15T16:46:23Z","abstract_excerpt":"Ransomware recovery in critical manufacturing infrastructure is not only a backup-restoration problem. Production capability depends on coupled information-technology, operational-technology, physical-process, quality, logistics, identity, and supplier systems. After ransomware, a plant may rebuild servers yet remain unable to schedule work, authenticate operators, trust engineering workstations, release product, reconnect OT assets, or coordinate suppliers. This paper reframes manufacturing ransomware recovery as a critical-infrastructure continuity and interdependency problem. We conduct a P"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.16167","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.16167/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"cited_work_retraction","ran_at":"2026-05-19T17:52:15.101092Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"ai_meta_artifact","ran_at":"2026-05-19T17:33:31.033109Z","status":"skipped","version":"1.0.0","findings_count":0},{"name":"external_links","ran_at":"2026-05-19T17:31:46.597218Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T16:41:55.431716Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"83c36de09fe960e5c6b90d19112b4fa23589944c7759f69ab57228a37aa5042c"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lzs5HLpOhx/K84WW0ieHOMv8I/kB6nnrxG2xKN82M+l3bGXzkQICMnaUe388j2nIAqoh5J0cGSW3TazDsCG+AQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T20:28:24.972926Z"},"content_sha256":"b452ad2c61217803b6afb467f59dbb6a7e161902b7b93b2506f0bce513876e6f","schema_version":"1.0","event_id":"sha256:b452ad2c61217803b6afb467f59dbb6a7e161902b7b93b2506f0bce513876e6f"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:CBG6BFOND543VEJJ3HPCCWRR32","target":"integrity","payload":{"note":"Identifier '10.1016/j.ijcip.2022.100505' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, \"A cyber incident response and recovery framework to support operators of industrial control systems,\" International Journal of Critical Infrastructure Protec","arxiv_id":"2605.16167","detector":"doi_compliance","evidence":{"doi":"10.1016/j.ijcip.2022.100505","arxiv_id":null,"ref_index":36,"raw_excerpt":"A. Staves, T. Anderson, A. Balderstone, B. Green, A. Gouglidis, and D. Hutchison, \"A cyber incident response and recovery framework to support operators of industrial control systems,\" International Journal of Critical Infrastructure Protection, vol. 37, Art. no. 100505, 2022, doi: 10.1016/j.ijcip.2022.100505. [25]J.Huang, J.Xu, X.Xing, P.Liu, andM.K.Qureshi, \"FlashGuard: Leveragingintrinsicflash ","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":36,"audited_at":"2026-05-20T17:12:51.133766Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.ijcip.2022.100505","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"fa08feb129836f89028ebfdc116a3cb2b362523a0e26e85659d839ac5510ce46","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5296,"payload_sha256":"8067a5d40b572009bdcf8dd7ad5a6bf5959abfcfa1f70a5df954fcf631f0ebd8","signature_b64":"niCuCO5pvWweQC8VyZZdC0eGsQOnITQKWO1jRNbMd9uFOpwnpdrVQ7aFgO9Yq1eZ+6ftyhFYz/fd+QyuZCCvDA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T17:13:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"w6j5acwmYmBx80+L2tzQQDcOdOrafqNAqvgMB8qasvq/IYO/Gp9cj9fc6crciywuZyAqKZdbZ1FDgaJHlby7CA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T20:28:24.974483Z"},"content_sha256":"abc3b61f6b512a070a470ff5f4001c4e91fdec121450357c1df4fdd0eb99bcb4","schema_version":"1.0","event_id":"sha256:abc3b61f6b512a070a470ff5f4001c4e91fdec121450357c1df4fdd0eb99bcb4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CBG6BFOND543VEJJ3HPCCWRR32/bundle.json","state_url":"https://pith.science/pith/CBG6BFOND543VEJJ3HPCCWRR32/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CBG6BFOND543VEJJ3HPCCWRR32/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T20:28:24Z","links":{"resolver":"https://pith.science/pith/CBG6BFOND543VEJJ3HPCCWRR32","bundle":"https://pith.science/pith/CBG6BFOND543VEJJ3HPCCWRR32/bundle.json","state":"https://pith.science/pith/CBG6BFOND543VEJJ3HPCCWRR32/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CBG6BFOND543VEJJ3HPCCWRR32/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:CBG6BFOND543VEJJ3HPCCWRR32","merge_version":"pith-open-graph-merge-v1","event_count":3,"valid_event_count":3,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6e55fb6c6a1b28dcedb7558f7fd87660ea686c2597f6bced30ea69b29ee080ae","cross_cats_sorted":["cs.CY","cs.DC","cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T16:46:23Z","title_canon_sha256":"51245a36816913ba88c4b2f80af5585f69a3c6e178f84ec8e13d250876b09797"},"schema_version":"1.0","source":{"id":"2605.16167","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.16167","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"arxiv_version","alias_value":"2605.16167v1","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.16167","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_12","alias_value":"CBG6BFOND543","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_16","alias_value":"CBG6BFOND543VEJJ","created_at":"2026-05-20T00:01:55Z"},{"alias_kind":"pith_short_8","alias_value":"CBG6BFON","created_at":"2026-05-20T00:01:55Z"}],"graph_snapshots":[{"event_id":"sha256:b452ad2c61217803b6afb467f59dbb6a7e161902b7b93b2506f0bce513876e6f","target":"graph","created_at":"2026-05-20T00:01:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"cited_work_retraction","ran_at":"2026-05-19T17:52:15.101092Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T17:33:31.033109Z","status":"skipped","version":"1.0.0"},{"findings_count":0,"name":"external_links","ran_at":"2026-05-19T17:31:46.597218Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"claim_evidence","ran_at":"2026-05-19T16:41:55.431716Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.16167/integrity.json","findings":[],"snapshot_sha256":"83c36de09fe960e5c6b90d19112b4fa23589944c7759f69ab57228a37aa5042c","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Ransomware recovery in critical manufacturing infrastructure is not only a backup-restoration problem. Production capability depends on coupled information-technology, operational-technology, physical-process, quality, logistics, identity, and supplier systems. After ransomware, a plant may rebuild servers yet remain unable to schedule work, authenticate operators, trust engineering workstations, release product, reconnect OT assets, or coordinate suppliers. This paper reframes manufacturing ransomware recovery as a critical-infrastructure continuity and interdependency problem. We conduct a P","authors_text":"Chun Yin Chiu","cross_cats":["cs.CY","cs.DC","cs.SE"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T16:46:23Z","title":"From Backup Restoration to Minimum Viable Factory Recovery: A Systematization of Ransomware Recovery in Manufacturing Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.16167","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4b0d8c0ac0fd87dbfd709ab8b2123da03511e0bf8a7496a59873f0e0369b6f15","target":"record","created_at":"2026-05-20T00:01:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6e55fb6c6a1b28dcedb7558f7fd87660ea686c2597f6bced30ea69b29ee080ae","cross_cats_sorted":["cs.CY","cs.DC","cs.SE"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T16:46:23Z","title_canon_sha256":"51245a36816913ba88c4b2f80af5585f69a3c6e178f84ec8e13d250876b09797"},"schema_version":"1.0","source":{"id":"2605.16167","kind":"arxiv","version":1}},"canonical_sha256":"104de095cd1f79ba9129d9de215a31de8df110164a308a7f221d7a54ad366f02","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"104de095cd1f79ba9129d9de215a31de8df110164a308a7f221d7a54ad366f02","first_computed_at":"2026-05-20T00:01:55.884704Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:01:55.884704Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"lLtbG/oFu00JAieqKszj/CTS35XsoFoo/f0KFMAqc5BXW1ePtzVTxYVB3Zd1Kin5RvzsqF8CYfyeGkT8dbpXBA==","signature_status":"signed_v1","signed_at":"2026-05-20T00:01:55.885548Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.16167","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4b0d8c0ac0fd87dbfd709ab8b2123da03511e0bf8a7496a59873f0e0369b6f15","sha256:b452ad2c61217803b6afb467f59dbb6a7e161902b7b93b2506f0bce513876e6f","sha256:abc3b61f6b512a070a470ff5f4001c4e91fdec121450357c1df4fdd0eb99bcb4"],"state_sha256":"6826981d517ff4205bc7c5544525eaa37e4e12088bd8f5abdcdb0ff8b9bdf7a0"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"L7nkcIlaMQsvbOrIsAYukI2dPqSRbn8szdDRu9eWQKkwRGPROaQutoarTfkkih7BJU1Z2rOm0ogSnYHCqTbXDA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T20:28:24.978204Z","bundle_sha256":"9caeb212d3af3b892c9a3fc49b78848a39cf9ec75f8acbc345d644c5c73c4fad"}}