{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:GUTBOQUB6NL4AVLQFCBV7INR4X","short_pith_number":"pith:GUTBOQUB","schema_version":"1.0","canonical_sha256":"3526174281f357c0557028835fa1b1e5e51f9315efe4433f1996db6601dcd40e","source":{"kind":"arxiv","id":"1710.02576","version":1},"attestation_state":"computed","paper":{"title":"Constraining Attacker Capabilities Through Actuator Saturation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.DS","math.OC"],"primary_cat":"cs.SY","authors_text":"Alvaro A. Cardenas, Carlos Murguia, Jairo Giraldo, Justin Ruths, Sahand Hadizadeh Kafash","submitted_at":"2017-10-06T20:28:13Z","abstract_excerpt":"For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide tools for designing new artificial limits on the actuators (smaller than their physical bounds) such that the new ellipsoidal bounds (and thus the new reachable sets) are as large as possible (in terms o"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1710.02576","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SY","submitted_at":"2017-10-06T20:28:13Z","cross_cats_sorted":["math.DS","math.OC"],"title_canon_sha256":"8bcb75282bd9fd662fabdcee00cd5ac87dad1b62a937132ec4bb481fecf987c1","abstract_canon_sha256":"7eb7f7efa24b135ba6c2cd09bf0086466132f1475576a89748633199ee0ba604"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:33:29.396017Z","signature_b64":"WzyjiZHFen9HUQSs712NV8GBCRxVBR/4EAh6ZONfXF80A4PNn9A1B0pEHMcB4T/h/yvrVU0lmAdHWhHy/OhhCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3526174281f357c0557028835fa1b1e5e51f9315efe4433f1996db6601dcd40e","last_reissued_at":"2026-05-18T00:33:29.395438Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:33:29.395438Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Constraining Attacker Capabilities Through Actuator Saturation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.DS","math.OC"],"primary_cat":"cs.SY","authors_text":"Alvaro A. Cardenas, Carlos Murguia, Jairo Giraldo, Justin Ruths, Sahand Hadizadeh Kafash","submitted_at":"2017-10-06T20:28:13Z","abstract_excerpt":"For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide tools for designing new artificial limits on the actuators (smaller than their physical bounds) such that the new ellipsoidal bounds (and thus the new reachable sets) are as large as possible (in terms o"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1710.02576","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1710.02576","created_at":"2026-05-18T00:33:29.395530+00:00"},{"alias_kind":"arxiv_version","alias_value":"1710.02576v1","created_at":"2026-05-18T00:33:29.395530+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1710.02576","created_at":"2026-05-18T00:33:29.395530+00:00"},{"alias_kind":"pith_short_12","alias_value":"GUTBOQUB6NL4","created_at":"2026-05-18T12:31:18.294218+00:00"},{"alias_kind":"pith_short_16","alias_value":"GUTBOQUB6NL4AVLQ","created_at":"2026-05-18T12:31:18.294218+00:00"},{"alias_kind":"pith_short_8","alias_value":"GUTBOQUB","created_at":"2026-05-18T12:31:18.294218+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X","json":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X.json","graph_json":"https://pith.science/api/pith-number/GUTBOQUB6NL4AVLQFCBV7INR4X/graph.json","events_json":"https://pith.science/api/pith-number/GUTBOQUB6NL4AVLQFCBV7INR4X/events.json","paper":"https://pith.science/paper/GUTBOQUB"},"agent_actions":{"view_html":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X","download_json":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X.json","view_paper":"https://pith.science/paper/GUTBOQUB","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1710.02576&json=true","fetch_graph":"https://pith.science/api/pith-number/GUTBOQUB6NL4AVLQFCBV7INR4X/graph.json","fetch_events":"https://pith.science/api/pith-number/GUTBOQUB6NL4AVLQFCBV7INR4X/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X/action/timestamp_anchor","attest_storage":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X/action/storage_attestation","attest_author":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X/action/author_attestation","sign_citation":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X/action/citation_signature","submit_replication":"https://pith.science/pith/GUTBOQUB6NL4AVLQFCBV7INR4X/action/replication_record"}},"created_at":"2026-05-18T00:33:29.395530+00:00","updated_at":"2026-05-18T00:33:29.395530+00:00"}