{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:CBM2AL7KAPDFXVKF7GTF5VVSGQ","short_pith_number":"pith:CBM2AL7K","canonical_record":{"source":{"id":"1706.05715","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-06-18T20:12:09Z","cross_cats_sorted":[],"title_canon_sha256":"898218ae1780165ef12a66107428107e040b51040a1f76941d56037dbad75674","abstract_canon_sha256":"c6267e36e12b769ddff20708c0394e18de352b2c16bbebbbf6be79ae527665ef"},"schema_version":"1.0"},"canonical_sha256":"1059a02fea03c65bd545f9a65ed6b2343b01467d18556e2ac4408ab66af520f2","source":{"kind":"arxiv","id":"1706.05715","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1706.05715","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"arxiv_version","alias_value":"1706.05715v1","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1706.05715","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"pith_short_12","alias_value":"CBM2AL7KAPDF","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_16","alias_value":"CBM2AL7KAPDFXVKF","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_8","alias_value":"CBM2AL7K","created_at":"2026-05-18T12:31:10Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:CBM2AL7KAPDFXVKF7GTF5VVSGQ","target":"record","payload":{"canonical_record":{"source":{"id":"1706.05715","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-06-18T20:12:09Z","cross_cats_sorted":[],"title_canon_sha256":"898218ae1780165ef12a66107428107e040b51040a1f76941d56037dbad75674","abstract_canon_sha256":"c6267e36e12b769ddff20708c0394e18de352b2c16bbebbbf6be79ae527665ef"},"schema_version":"1.0"},"canonical_sha256":"1059a02fea03c65bd545f9a65ed6b2343b01467d18556e2ac4408ab66af520f2","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:42:09.129833Z","signature_b64":"te/E2ldCdtG/noe2wMFhOz6jYlPo/44yqftKhtonuuHGiIYcwcbYUQio7nn7jIsgPCCxyrEucV3by+ya86iABQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"1059a02fea03c65bd545f9a65ed6b2343b01467d18556e2ac4408ab66af520f2","last_reissued_at":"2026-05-18T00:42:09.129395Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:42:09.129395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1706.05715","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:42:09Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ue22dT9/yPndWX9x0V9yqXUR8le836U3rbmrTWBTzzoD+B3tKyXwTr6nQLajUO/MLUVCf8L/IQ21QUX/d5leDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:56:33.802111Z"},"content_sha256":"c4a3a9ee0872e0367fb801e82c6e3504ecfb57033d427ec479abd8f89fcb801f","schema_version":"1.0","event_id":"sha256:c4a3a9ee0872e0367fb801e82c6e3504ecfb57033d427ec479abd8f89fcb801f"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:CBM2AL7KAPDFXVKF7GTF5VVSGQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jan-Erik Ekberg, Lucas Davi, N. Asokan, Thomas Nyman","submitted_at":"2017-06-18T20:12:09Z","abstract_excerpt":"With the increasing scale of deployment of Internet of Things (IoT), concerns about IoT security have become more urgent. In particular, memory corruption attacks play a predominant role as they allow remote compromise of IoT devices. Control-flow integrity (CFI) is a promising and generic defense technique against these attacks. However, given the nature of IoT deployments, existing protection mechanisms for traditional computing environments (including CFI) need to be adapted to the IoT setting. In this paper, we describe the challenges of enabling CFI on microcontroller (MCU) based IoT devi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1706.05715","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:42:09Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"IZ83UZjsHRCHY0mB/VyW4drnk6O5n6Mu3Cwf6ZK7JRpKxAWoEkpEF6+/mp07D4JEcWfdVse9cF/JST+K3iHOAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:56:33.802720Z"},"content_sha256":"d2c1d06d68a760e10a3317b748f8996105adc79ad98703c58dbf568fb3ece5ee","schema_version":"1.0","event_id":"sha256:d2c1d06d68a760e10a3317b748f8996105adc79ad98703c58dbf568fb3ece5ee"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/bundle.json","state_url":"https://pith.science/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T00:56:33Z","links":{"resolver":"https://pith.science/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ","bundle":"https://pith.science/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/bundle.json","state":"https://pith.science/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CBM2AL7KAPDFXVKF7GTF5VVSGQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:CBM2AL7KAPDFXVKF7GTF5VVSGQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c6267e36e12b769ddff20708c0394e18de352b2c16bbebbbf6be79ae527665ef","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-06-18T20:12:09Z","title_canon_sha256":"898218ae1780165ef12a66107428107e040b51040a1f76941d56037dbad75674"},"schema_version":"1.0","source":{"id":"1706.05715","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1706.05715","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"arxiv_version","alias_value":"1706.05715v1","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1706.05715","created_at":"2026-05-18T00:42:09Z"},{"alias_kind":"pith_short_12","alias_value":"CBM2AL7KAPDF","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_16","alias_value":"CBM2AL7KAPDFXVKF","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_8","alias_value":"CBM2AL7K","created_at":"2026-05-18T12:31:10Z"}],"graph_snapshots":[{"event_id":"sha256:d2c1d06d68a760e10a3317b748f8996105adc79ad98703c58dbf568fb3ece5ee","target":"graph","created_at":"2026-05-18T00:42:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"With the increasing scale of deployment of Internet of Things (IoT), concerns about IoT security have become more urgent. In particular, memory corruption attacks play a predominant role as they allow remote compromise of IoT devices. Control-flow integrity (CFI) is a promising and generic defense technique against these attacks. However, given the nature of IoT deployments, existing protection mechanisms for traditional computing environments (including CFI) need to be adapted to the IoT setting. In this paper, we describe the challenges of enabling CFI on microcontroller (MCU) based IoT devi","authors_text":"Jan-Erik Ekberg, Lucas Davi, N. Asokan, Thomas Nyman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-06-18T20:12:09Z","title":"CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1706.05715","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c4a3a9ee0872e0367fb801e82c6e3504ecfb57033d427ec479abd8f89fcb801f","target":"record","created_at":"2026-05-18T00:42:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c6267e36e12b769ddff20708c0394e18de352b2c16bbebbbf6be79ae527665ef","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-06-18T20:12:09Z","title_canon_sha256":"898218ae1780165ef12a66107428107e040b51040a1f76941d56037dbad75674"},"schema_version":"1.0","source":{"id":"1706.05715","kind":"arxiv","version":1}},"canonical_sha256":"1059a02fea03c65bd545f9a65ed6b2343b01467d18556e2ac4408ab66af520f2","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"1059a02fea03c65bd545f9a65ed6b2343b01467d18556e2ac4408ab66af520f2","first_computed_at":"2026-05-18T00:42:09.129395Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:42:09.129395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"te/E2ldCdtG/noe2wMFhOz6jYlPo/44yqftKhtonuuHGiIYcwcbYUQio7nn7jIsgPCCxyrEucV3by+ya86iABQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:42:09.129833Z","signed_message":"canonical_sha256_bytes"},"source_id":"1706.05715","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c4a3a9ee0872e0367fb801e82c6e3504ecfb57033d427ec479abd8f89fcb801f","sha256:d2c1d06d68a760e10a3317b748f8996105adc79ad98703c58dbf568fb3ece5ee"],"state_sha256":"91bbdba22449be49a549c294260c1d9ae6a2dd9d9f801f077653c89e22391613"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ClWtBP1p5Tsc6xpoQ/XtSBwT6DKXvbEnqYdKwqxVCP1O+ftd/mQl9jsQkQB/CaSpu6IYJ1stLLQnnQVK/b04DA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T00:56:33.805384Z","bundle_sha256":"f3dc139334925a8020529cdb59cc2d630d0264ef2ab4d7833a7681e1ca991ee1"}}