{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:I2FKMVJAF5CHPEBHWIIUKBWU76","short_pith_number":"pith:I2FKMVJA","canonical_record":{"source":{"id":"1905.07705","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2019-05-19T08:17:36Z","cross_cats_sorted":[],"title_canon_sha256":"0fd600c717ba2b324c0a7d6119930ef323b7948343cb31e0626fb6ea04e6934e","abstract_canon_sha256":"aa928e5a2221592f776ffff583ea751f5336a5e697171bb567bcd20ad8a7cd8b"},"schema_version":"1.0"},"canonical_sha256":"468aa655202f44779027b2114506d4ffb8576589cc7db7ee306168d512db8629","source":{"kind":"arxiv","id":"1905.07705","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1905.07705","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"arxiv_version","alias_value":"1905.07705v2","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1905.07705","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"pith_short_12","alias_value":"I2FKMVJAF5CH","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"I2FKMVJAF5CHPEBH","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"I2FKMVJA","created_at":"2026-05-18T12:33:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:I2FKMVJAF5CHPEBHWIIUKBWU76","target":"record","payload":{"canonical_record":{"source":{"id":"1905.07705","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2019-05-19T08:17:36Z","cross_cats_sorted":[],"title_canon_sha256":"0fd600c717ba2b324c0a7d6119930ef323b7948343cb31e0626fb6ea04e6934e","abstract_canon_sha256":"aa928e5a2221592f776ffff583ea751f5336a5e697171bb567bcd20ad8a7cd8b"},"schema_version":"1.0"},"canonical_sha256":"468aa655202f44779027b2114506d4ffb8576589cc7db7ee306168d512db8629","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:45:03.742200Z","signature_b64":"pfGiIJFtkZGfkh/c8uG3EuTXy5433NfaIldOMHWurPmhLrhOG6a2Urm9KHG6aApIyPuRuOdRowNXsYCW8f1EBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"468aa655202f44779027b2114506d4ffb8576589cc7db7ee306168d512db8629","last_reissued_at":"2026-05-17T23:45:03.741590Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:45:03.741590Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1905.07705","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:45:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tO4EqJvXGuCeCH8jwdNi0Ykf8trDFQTkFTbJT7DoB29XJ8DyWGk+/WsC0ce0Kthfh8mkrc3vboOcjMfYl4fmDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:29:54.315820Z"},"content_sha256":"059df6980b595092738eca72bc75f47edf740aaf6ff2086b702cd1d58a24561f","schema_version":"1.0","event_id":"sha256:059df6980b595092738eca72bc75f47edf740aaf6ff2086b702cd1d58a24561f"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:I2FKMVJAF5CHPEBHWIIUKBWU76","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Property Directed Self Composition","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.PL","authors_text":"Arie Gurfinkel, Ron Shemer, Sharon Shoham, Yakir Vizel","submitted_at":"2019-05-19T08:17:36Z","abstract_excerpt":"We address the problem of verifying k-safety properties: properties that refer to k-interacting executions of a program. A prominent way to verify k-safety properties is by self composition. In this approach, the problem of checking k-safety over the original program is reduced to checking an \"ordinary\" safety property over a program that executes k copies of the original program in some order. The way in which the copies are composed determines how complicated it is to verify the composed program. We view this composition as provided by a semantic self composition function that maps each stat"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1905.07705","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:45:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zfF/rT5BNB1UgcQVLja3yfQsBopaR2LS7x30oDUumEQKQHjS4m8eMndrG1dPasG2xtLXR9ObGYESp/X8JbC7Dw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:29:54.316168Z"},"content_sha256":"f1a0226f1bf8309c86c37cefc13395e7150825d598fe1c7bbf4b6bef3afaea51","schema_version":"1.0","event_id":"sha256:f1a0226f1bf8309c86c37cefc13395e7150825d598fe1c7bbf4b6bef3afaea51"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/bundle.json","state_url":"https://pith.science/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:29:54Z","links":{"resolver":"https://pith.science/pith/I2FKMVJAF5CHPEBHWIIUKBWU76","bundle":"https://pith.science/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/bundle.json","state":"https://pith.science/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/state.json","well_known_bundle":"https://pith.science/.well-known/pith/I2FKMVJAF5CHPEBHWIIUKBWU76/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:I2FKMVJAF5CHPEBHWIIUKBWU76","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"aa928e5a2221592f776ffff583ea751f5336a5e697171bb567bcd20ad8a7cd8b","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2019-05-19T08:17:36Z","title_canon_sha256":"0fd600c717ba2b324c0a7d6119930ef323b7948343cb31e0626fb6ea04e6934e"},"schema_version":"1.0","source":{"id":"1905.07705","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1905.07705","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"arxiv_version","alias_value":"1905.07705v2","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1905.07705","created_at":"2026-05-17T23:45:03Z"},{"alias_kind":"pith_short_12","alias_value":"I2FKMVJAF5CH","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_16","alias_value":"I2FKMVJAF5CHPEBH","created_at":"2026-05-18T12:33:18Z"},{"alias_kind":"pith_short_8","alias_value":"I2FKMVJA","created_at":"2026-05-18T12:33:18Z"}],"graph_snapshots":[{"event_id":"sha256:f1a0226f1bf8309c86c37cefc13395e7150825d598fe1c7bbf4b6bef3afaea51","target":"graph","created_at":"2026-05-17T23:45:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We address the problem of verifying k-safety properties: properties that refer to k-interacting executions of a program. A prominent way to verify k-safety properties is by self composition. In this approach, the problem of checking k-safety over the original program is reduced to checking an \"ordinary\" safety property over a program that executes k copies of the original program in some order. The way in which the copies are composed determines how complicated it is to verify the composed program. We view this composition as provided by a semantic self composition function that maps each stat","authors_text":"Arie Gurfinkel, Ron Shemer, Sharon Shoham, Yakir Vizel","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2019-05-19T08:17:36Z","title":"Property Directed Self Composition"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1905.07705","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:059df6980b595092738eca72bc75f47edf740aaf6ff2086b702cd1d58a24561f","target":"record","created_at":"2026-05-17T23:45:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"aa928e5a2221592f776ffff583ea751f5336a5e697171bb567bcd20ad8a7cd8b","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PL","submitted_at":"2019-05-19T08:17:36Z","title_canon_sha256":"0fd600c717ba2b324c0a7d6119930ef323b7948343cb31e0626fb6ea04e6934e"},"schema_version":"1.0","source":{"id":"1905.07705","kind":"arxiv","version":2}},"canonical_sha256":"468aa655202f44779027b2114506d4ffb8576589cc7db7ee306168d512db8629","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"468aa655202f44779027b2114506d4ffb8576589cc7db7ee306168d512db8629","first_computed_at":"2026-05-17T23:45:03.741590Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:45:03.741590Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"pfGiIJFtkZGfkh/c8uG3EuTXy5433NfaIldOMHWurPmhLrhOG6a2Urm9KHG6aApIyPuRuOdRowNXsYCW8f1EBw==","signature_status":"signed_v1","signed_at":"2026-05-17T23:45:03.742200Z","signed_message":"canonical_sha256_bytes"},"source_id":"1905.07705","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:059df6980b595092738eca72bc75f47edf740aaf6ff2086b702cd1d58a24561f","sha256:f1a0226f1bf8309c86c37cefc13395e7150825d598fe1c7bbf4b6bef3afaea51"],"state_sha256":"c6edc6ec5f2e2e201ce4e9916f9d12db425c4e70929293ccd8caa62f19dfeeaf"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ihJaNmAM7MR4XRcUUMH0YYenxblQ4Q6LdqYRIB4oiMrPfve4GKAck0zo66WD/6SADcnR3IH5EBvnq1HDhu5lBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:29:54.318150Z","bundle_sha256":"5b45ab8f7789802ec08489278ac8251dab78f427ed84ca8499a7becd7de10649"}}