{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:I762OYPB32N42LVAE2AORX6I3D","short_pith_number":"pith:I762OYPB","canonical_record":{"source":{"id":"1510.07563","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-10-26T17:41:49Z","cross_cats_sorted":[],"title_canon_sha256":"593fb516f72051d5ea1330b866331c86a53ebd66088e5742988438bbd236a109","abstract_canon_sha256":"02a8d366cb1b15969daab7cb62e4c0e8610268c90e04b9b6a2aa415b4413d301"},"schema_version":"1.0"},"canonical_sha256":"47fda761e1de9bcd2ea02680e8dfc8d8e1c80db235e685280a98022ce38dd926","source":{"kind":"arxiv","id":"1510.07563","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1510.07563","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"arxiv_version","alias_value":"1510.07563v3","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1510.07563","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"pith_short_12","alias_value":"I762OYPB32N4","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_16","alias_value":"I762OYPB32N42LVA","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_8","alias_value":"I762OYPB","created_at":"2026-05-18T12:29:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:I762OYPB32N42LVAE2AORX6I3D","target":"record","payload":{"canonical_record":{"source":{"id":"1510.07563","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-10-26T17:41:49Z","cross_cats_sorted":[],"title_canon_sha256":"593fb516f72051d5ea1330b866331c86a53ebd66088e5742988438bbd236a109","abstract_canon_sha256":"02a8d366cb1b15969daab7cb62e4c0e8610268c90e04b9b6a2aa415b4413d301"},"schema_version":"1.0"},"canonical_sha256":"47fda761e1de9bcd2ea02680e8dfc8d8e1c80db235e685280a98022ce38dd926","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:38:32.195077Z","signature_b64":"aQqKdB6eN0G5t2BINASgGQ8ZOU6BHB3etgFdeCeGdceRVspaqM4sHBsHJYQmqEBHfRK3YD6AhrT3tX8Qrof6BA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"47fda761e1de9bcd2ea02680e8dfc8d8e1c80db235e685280a98022ce38dd926","last_reissued_at":"2026-05-18T00:38:32.194637Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:38:32.194637Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1510.07563","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:38:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LohgR/df4KJojw2doEmr+XZFH+3HnWTtuYoxY7pokDjjuzPDMwRmEBrxZwu5f8PbVw4PZd+FlSRvYE3IwU8rCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T17:50:07.232122Z"},"content_sha256":"c6df42c655d02838d7daa6ebd2d442cd4fe4923d69954de57624b0930bcedce4","schema_version":"1.0","event_id":"sha256:c6df42c655d02838d7daa6ebd2d442cd4fe4923d69954de57624b0930bcedce4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:I762OYPB32N42LVAE2AORX6I3D","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Altaf Shaik, Jean-Pierre Seifert, N. Asokan, Ravishankar Borgaonkar, Valtteri Niemi","submitted_at":"2015-10-26T17:41:49Z","abstract_excerpt":"Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation \"Long Term Evolution\" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.\n  We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks explo"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1510.07563","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:38:32Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g3RuW+Jdqo8c1SQFsQE5aNaa2NxTvfnC5Rx+0feHkVU1n+tULwVoom35enPdB0x+QVMwKgLL1oE+fAO8UBpICQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T17:50:07.232805Z"},"content_sha256":"08b6adffd7832dfcd35bcc2eedf9bdbaeb058723f98d699f5033b783cd2429e8","schema_version":"1.0","event_id":"sha256:08b6adffd7832dfcd35bcc2eedf9bdbaeb058723f98d699f5033b783cd2429e8"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/I762OYPB32N42LVAE2AORX6I3D/bundle.json","state_url":"https://pith.science/pith/I762OYPB32N42LVAE2AORX6I3D/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/I762OYPB32N42LVAE2AORX6I3D/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T17:50:07Z","links":{"resolver":"https://pith.science/pith/I762OYPB32N42LVAE2AORX6I3D","bundle":"https://pith.science/pith/I762OYPB32N42LVAE2AORX6I3D/bundle.json","state":"https://pith.science/pith/I762OYPB32N42LVAE2AORX6I3D/state.json","well_known_bundle":"https://pith.science/.well-known/pith/I762OYPB32N42LVAE2AORX6I3D/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:I762OYPB32N42LVAE2AORX6I3D","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"02a8d366cb1b15969daab7cb62e4c0e8610268c90e04b9b6a2aa415b4413d301","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-10-26T17:41:49Z","title_canon_sha256":"593fb516f72051d5ea1330b866331c86a53ebd66088e5742988438bbd236a109"},"schema_version":"1.0","source":{"id":"1510.07563","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1510.07563","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"arxiv_version","alias_value":"1510.07563v3","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1510.07563","created_at":"2026-05-18T00:38:32Z"},{"alias_kind":"pith_short_12","alias_value":"I762OYPB32N4","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_16","alias_value":"I762OYPB32N42LVA","created_at":"2026-05-18T12:29:25Z"},{"alias_kind":"pith_short_8","alias_value":"I762OYPB","created_at":"2026-05-18T12:29:25Z"}],"graph_snapshots":[{"event_id":"sha256:08b6adffd7832dfcd35bcc2eedf9bdbaeb058723f98d699f5033b783cd2429e8","target":"graph","created_at":"2026-05-18T00:38:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation \"Long Term Evolution\" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers.\n  We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile devices in real LTE networks, we demonstrate inexpensive, and practical attacks explo","authors_text":"Altaf Shaik, Jean-Pierre Seifert, N. Asokan, Ravishankar Borgaonkar, Valtteri Niemi","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-10-26T17:41:49Z","title":"Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1510.07563","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c6df42c655d02838d7daa6ebd2d442cd4fe4923d69954de57624b0930bcedce4","target":"record","created_at":"2026-05-18T00:38:32Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"02a8d366cb1b15969daab7cb62e4c0e8610268c90e04b9b6a2aa415b4413d301","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-10-26T17:41:49Z","title_canon_sha256":"593fb516f72051d5ea1330b866331c86a53ebd66088e5742988438bbd236a109"},"schema_version":"1.0","source":{"id":"1510.07563","kind":"arxiv","version":3}},"canonical_sha256":"47fda761e1de9bcd2ea02680e8dfc8d8e1c80db235e685280a98022ce38dd926","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"47fda761e1de9bcd2ea02680e8dfc8d8e1c80db235e685280a98022ce38dd926","first_computed_at":"2026-05-18T00:38:32.194637Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:38:32.194637Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"aQqKdB6eN0G5t2BINASgGQ8ZOU6BHB3etgFdeCeGdceRVspaqM4sHBsHJYQmqEBHfRK3YD6AhrT3tX8Qrof6BA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:38:32.195077Z","signed_message":"canonical_sha256_bytes"},"source_id":"1510.07563","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c6df42c655d02838d7daa6ebd2d442cd4fe4923d69954de57624b0930bcedce4","sha256:08b6adffd7832dfcd35bcc2eedf9bdbaeb058723f98d699f5033b783cd2429e8"],"state_sha256":"bc5a334aaf833e5e1e3fabf37dda9e3084d441d369778e4f6e7a699a7797c27f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"e8CoUmrS7D/wcgv3UGxNo9mx88Z3OUvI3EF30f6Xv8dV0MzTpr0lVGkeDa66fQ0KD6EcqRG1mfrD+L9BJthICQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T17:50:07.236366Z","bundle_sha256":"9b2defa4eca85aa61632d091fae7cee8fd0af57c66be434810c13cb387ae162b"}}