{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:CYHO4XJE3UNUJVZCVAJCS5243H","short_pith_number":"pith:CYHO4XJE","canonical_record":{"source":{"id":"1202.4008","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2012-02-17T20:28:50Z","cross_cats_sorted":["cs.CR","cs.MA"],"title_canon_sha256":"ad5f8ed708f13f4d2ed1ad1184f6f86e3600f51db33836d20bd5f7d4d4c1d512","abstract_canon_sha256":"f965d5dae46d96f68afd91552f8001aaea3e471a1d1945361d8b44bce8c1d476"},"schema_version":"1.0"},"canonical_sha256":"160eee5d24dd1b44d722a81229775cd9c43836ceeae642af631d550780605726","source":{"kind":"arxiv","id":"1202.4008","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1202.4008","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"arxiv_version","alias_value":"1202.4008v1","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.4008","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"pith_short_12","alias_value":"CYHO4XJE3UNU","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_16","alias_value":"CYHO4XJE3UNUJVZC","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_8","alias_value":"CYHO4XJE","created_at":"2026-05-18T12:27:01Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:CYHO4XJE3UNUJVZCVAJCS5243H","target":"record","payload":{"canonical_record":{"source":{"id":"1202.4008","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2012-02-17T20:28:50Z","cross_cats_sorted":["cs.CR","cs.MA"],"title_canon_sha256":"ad5f8ed708f13f4d2ed1ad1184f6f86e3600f51db33836d20bd5f7d4d4c1d512","abstract_canon_sha256":"f965d5dae46d96f68afd91552f8001aaea3e471a1d1945361d8b44bce8c1d476"},"schema_version":"1.0"},"canonical_sha256":"160eee5d24dd1b44d722a81229775cd9c43836ceeae642af631d550780605726","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:02:02.199754Z","signature_b64":"4RY/Ad7B62Sw++FIyaT+p1k70vIYeOyEaUn5n3TG2acxP+MbHnvHsQxlOhsZxK9pD0uWGmUWbCd48tsmSZYaBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"160eee5d24dd1b44d722a81229775cd9c43836ceeae642af631d550780605726","last_reissued_at":"2026-05-18T04:02:02.199195Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:02:02.199195Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1202.4008","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:02:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"sUQTijdm9hjR+louwyAFKnE6m5pQ1CB5G+HWcKicKv+1aVQ7IFRgwTCkwsThQSaiz5sf8GlgSurbz7p/ZrheDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:44:39.113749Z"},"content_sha256":"eab35c1a8bc13d16e93e20952c00e33b3bf1b5c83ae6f6d95cd7fed8c2cd8181","schema_version":"1.0","event_id":"sha256:eab35c1a8bc13d16e93e20952c00e33b3bf1b5c83ae6f6d95cd7fed8c2cd8181"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:CYHO4XJE3UNUJVZCVAJCS5243H","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Modeling Internet-Scale Policies for Cleaning up Malware","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.MA"],"primary_cat":"cs.NI","authors_text":"Benjamin Edwards, George Stelle, Stephanie Forrest, Steven Hofmeyr, Tyler Moore","submitted_at":"2012-02-17T20:28:50Z","abstract_excerpt":"An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. For instance, we find that coordinated intervention by the 0.2%-biggest ASes is more effective than uncoordinated efforts adopted by 30% of all ASes. Furthermore, countermeasures that block malicious tr"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.4008","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:02:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"iJMQQQFUi+nuTEZkJv41UObInef9mtcGQZHXytiw0HjT57yNHL5qFutl57ivc7eq4hpXSgAfOzbYewQMBjwsDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T08:44:39.114409Z"},"content_sha256":"a515cd4727e0efe768981bf7ee4078a455df2b30bee6e59d22a1ef061baba7d1","schema_version":"1.0","event_id":"sha256:a515cd4727e0efe768981bf7ee4078a455df2b30bee6e59d22a1ef061baba7d1"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CYHO4XJE3UNUJVZCVAJCS5243H/bundle.json","state_url":"https://pith.science/pith/CYHO4XJE3UNUJVZCVAJCS5243H/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CYHO4XJE3UNUJVZCVAJCS5243H/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T08:44:39Z","links":{"resolver":"https://pith.science/pith/CYHO4XJE3UNUJVZCVAJCS5243H","bundle":"https://pith.science/pith/CYHO4XJE3UNUJVZCVAJCS5243H/bundle.json","state":"https://pith.science/pith/CYHO4XJE3UNUJVZCVAJCS5243H/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CYHO4XJE3UNUJVZCVAJCS5243H/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:CYHO4XJE3UNUJVZCVAJCS5243H","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f965d5dae46d96f68afd91552f8001aaea3e471a1d1945361d8b44bce8c1d476","cross_cats_sorted":["cs.CR","cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2012-02-17T20:28:50Z","title_canon_sha256":"ad5f8ed708f13f4d2ed1ad1184f6f86e3600f51db33836d20bd5f7d4d4c1d512"},"schema_version":"1.0","source":{"id":"1202.4008","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1202.4008","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"arxiv_version","alias_value":"1202.4008v1","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.4008","created_at":"2026-05-18T04:02:02Z"},{"alias_kind":"pith_short_12","alias_value":"CYHO4XJE3UNU","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_16","alias_value":"CYHO4XJE3UNUJVZC","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_8","alias_value":"CYHO4XJE","created_at":"2026-05-18T12:27:01Z"}],"graph_snapshots":[{"event_id":"sha256:a515cd4727e0efe768981bf7ee4078a455df2b30bee6e59d22a1ef061baba7d1","target":"graph","created_at":"2026-05-18T04:02:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. For instance, we find that coordinated intervention by the 0.2%-biggest ASes is more effective than uncoordinated efforts adopted by 30% of all ASes. Furthermore, countermeasures that block malicious tr","authors_text":"Benjamin Edwards, George Stelle, Stephanie Forrest, Steven Hofmeyr, Tyler Moore","cross_cats":["cs.CR","cs.MA"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2012-02-17T20:28:50Z","title":"Modeling Internet-Scale Policies for Cleaning up Malware"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.4008","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:eab35c1a8bc13d16e93e20952c00e33b3bf1b5c83ae6f6d95cd7fed8c2cd8181","target":"record","created_at":"2026-05-18T04:02:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f965d5dae46d96f68afd91552f8001aaea3e471a1d1945361d8b44bce8c1d476","cross_cats_sorted":["cs.CR","cs.MA"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2012-02-17T20:28:50Z","title_canon_sha256":"ad5f8ed708f13f4d2ed1ad1184f6f86e3600f51db33836d20bd5f7d4d4c1d512"},"schema_version":"1.0","source":{"id":"1202.4008","kind":"arxiv","version":1}},"canonical_sha256":"160eee5d24dd1b44d722a81229775cd9c43836ceeae642af631d550780605726","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"160eee5d24dd1b44d722a81229775cd9c43836ceeae642af631d550780605726","first_computed_at":"2026-05-18T04:02:02.199195Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:02:02.199195Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"4RY/Ad7B62Sw++FIyaT+p1k70vIYeOyEaUn5n3TG2acxP+MbHnvHsQxlOhsZxK9pD0uWGmUWbCd48tsmSZYaBA==","signature_status":"signed_v1","signed_at":"2026-05-18T04:02:02.199754Z","signed_message":"canonical_sha256_bytes"},"source_id":"1202.4008","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:eab35c1a8bc13d16e93e20952c00e33b3bf1b5c83ae6f6d95cd7fed8c2cd8181","sha256:a515cd4727e0efe768981bf7ee4078a455df2b30bee6e59d22a1ef061baba7d1"],"state_sha256":"a0e3f967563f033a5cd1b0414d5104142f5699acc1ce343cd5c5045a88b1afe2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"UYCY2x4RLrvmsMO8XMfjUDw+lCnJSjhY9uwrVI5pro8ccytt2LOpEjLSa/XDTDEri1hwd4tVdJLnT1vVRN52Cg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T08:44:39.117942Z","bundle_sha256":"c753607e4ef312d3f69169c17ab618d55c883df23c9db795ffeceeee525d1836"}}