{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:HZ6RP3YWUFRTKXZ6ENZUP3Y337","short_pith_number":"pith:HZ6RP3YW","canonical_record":{"source":{"id":"1810.00281","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-09-30T00:24:22Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"0c015962c33af5c95f1105c2ace9c13523440d4298bc9c585977bf88d25dd392","abstract_canon_sha256":"ac1a51d39a579fdd1657cb83cdf3d6c8977c1806c02bdb68f4ab4424a7d9b5ea"},"schema_version":"1.0"},"canonical_sha256":"3e7d17ef16a163355f3e237347ef1bdff80bf67294abcff87ee50f9802bd876a","source":{"kind":"arxiv","id":"1810.00281","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.00281","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"arxiv_version","alias_value":"1810.00281v1","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.00281","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"pith_short_12","alias_value":"HZ6RP3YWUFRT","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"HZ6RP3YWUFRTKXZ6","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"HZ6RP3YW","created_at":"2026-05-18T12:32:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:HZ6RP3YWUFRTKXZ6ENZUP3Y337","target":"record","payload":{"canonical_record":{"source":{"id":"1810.00281","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-09-30T00:24:22Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"0c015962c33af5c95f1105c2ace9c13523440d4298bc9c585977bf88d25dd392","abstract_canon_sha256":"ac1a51d39a579fdd1657cb83cdf3d6c8977c1806c02bdb68f4ab4424a7d9b5ea"},"schema_version":"1.0"},"canonical_sha256":"3e7d17ef16a163355f3e237347ef1bdff80bf67294abcff87ee50f9802bd876a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:04:28.277915Z","signature_b64":"f7cXLnAQ4XECMRFmcPbT/HxmVm/P/gQvtnr1EEv2xHiVXoaZxm1eblYhqIzR2967Z/ioLl64KM+l4rxd+WD1CQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3e7d17ef16a163355f3e237347ef1bdff80bf67294abcff87ee50f9802bd876a","last_reissued_at":"2026-05-18T00:04:28.277294Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:04:28.277294Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1810.00281","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:04:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5qpeIc7UaqQagGy4V7rWB73XYUMJT+Wg8iZRlvj31J9ASJD7BJCV9f8fbL69Yt/iqgvo61Gk0aeCxyYKBHhPCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T11:14:06.580234Z"},"content_sha256":"a923992a0b8360cb464de35e6eb873d89a8645845703988b2e402a3ad4f4659d","schema_version":"1.0","event_id":"sha256:a923992a0b8360cb464de35e6eb873d89a8645845703988b2e402a3ad4f4659d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:HZ6RP3YWUFRTKXZ6ENZUP3Y337","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Community-Based Security for the Internet of Things","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.CY","authors_text":"Peter Schartner, Quanyan Zhu, Stefan Rass","submitted_at":"2018-09-30T00:24:22Z","abstract_excerpt":"With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT software. While these updates can be safely retrieved from app stores, the problems kick in via jailbroken devices and with the variety of untrusted sources arising on the internet. Since hacking is "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.00281","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:04:28Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6J8SfhVEr4IEvq1rQyKToddIBfTE35mHsjUMU+ek1BuPC/EKTn0cufWzACcZrz0MxafjHvXZFqJ29Ti1pCWZAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T11:14:06.580628Z"},"content_sha256":"fed1069494abe3f91a7c1eb158213f67e00e4e78d56905df6016270442d5b3ef","schema_version":"1.0","event_id":"sha256:fed1069494abe3f91a7c1eb158213f67e00e4e78d56905df6016270442d5b3ef"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/bundle.json","state_url":"https://pith.science/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T11:14:06Z","links":{"resolver":"https://pith.science/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337","bundle":"https://pith.science/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/bundle.json","state":"https://pith.science/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HZ6RP3YWUFRTKXZ6ENZUP3Y337/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:HZ6RP3YWUFRTKXZ6ENZUP3Y337","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ac1a51d39a579fdd1657cb83cdf3d6c8977c1806c02bdb68f4ab4424a7d9b5ea","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-09-30T00:24:22Z","title_canon_sha256":"0c015962c33af5c95f1105c2ace9c13523440d4298bc9c585977bf88d25dd392"},"schema_version":"1.0","source":{"id":"1810.00281","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.00281","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"arxiv_version","alias_value":"1810.00281v1","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.00281","created_at":"2026-05-18T00:04:28Z"},{"alias_kind":"pith_short_12","alias_value":"HZ6RP3YWUFRT","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_16","alias_value":"HZ6RP3YWUFRTKXZ6","created_at":"2026-05-18T12:32:28Z"},{"alias_kind":"pith_short_8","alias_value":"HZ6RP3YW","created_at":"2026-05-18T12:32:28Z"}],"graph_snapshots":[{"event_id":"sha256:fed1069494abe3f91a7c1eb158213f67e00e4e78d56905df6016270442d5b3ef","target":"graph","created_at":"2026-05-18T00:04:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT software. While these updates can be safely retrieved from app stores, the problems kick in via jailbroken devices and with the variety of untrusted sources arising on the internet. Since hacking is ","authors_text":"Peter Schartner, Quanyan Zhu, Stefan Rass","cross_cats":["cs.CR"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-09-30T00:24:22Z","title":"Community-Based Security for the Internet of Things"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.00281","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a923992a0b8360cb464de35e6eb873d89a8645845703988b2e402a3ad4f4659d","target":"record","created_at":"2026-05-18T00:04:28Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ac1a51d39a579fdd1657cb83cdf3d6c8977c1806c02bdb68f4ab4424a7d9b5ea","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-09-30T00:24:22Z","title_canon_sha256":"0c015962c33af5c95f1105c2ace9c13523440d4298bc9c585977bf88d25dd392"},"schema_version":"1.0","source":{"id":"1810.00281","kind":"arxiv","version":1}},"canonical_sha256":"3e7d17ef16a163355f3e237347ef1bdff80bf67294abcff87ee50f9802bd876a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3e7d17ef16a163355f3e237347ef1bdff80bf67294abcff87ee50f9802bd876a","first_computed_at":"2026-05-18T00:04:28.277294Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:04:28.277294Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"f7cXLnAQ4XECMRFmcPbT/HxmVm/P/gQvtnr1EEv2xHiVXoaZxm1eblYhqIzR2967Z/ioLl64KM+l4rxd+WD1CQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:04:28.277915Z","signed_message":"canonical_sha256_bytes"},"source_id":"1810.00281","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a923992a0b8360cb464de35e6eb873d89a8645845703988b2e402a3ad4f4659d","sha256:fed1069494abe3f91a7c1eb158213f67e00e4e78d56905df6016270442d5b3ef"],"state_sha256":"89f3ee0e148c8d7e4610f337d8612549c50664108766632795edfab699bd133f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"4zseEO37ipd8+gIiDVqAnItcMjofkcxqlUSScqFQU+oq9Txa1RvHGg/sWCzXbXHuaPaiBbqv9Jqv10L+IYsUCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T11:14:06.584142Z","bundle_sha256":"72cebfdddc3b51ad0451680fadcf7d4c893dae603666bfab6db4fadd3d100d7d"}}