{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:J5BVNXL63Q34XFO27FA46S5JDX","short_pith_number":"pith:J5BVNXL6","canonical_record":{"source":{"id":"1012.3156","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2010-12-14T20:24:21Z","cross_cats_sorted":["cs.CR","physics.soc-ph"],"title_canon_sha256":"a69a37122164b88f7549f2a47c7d1010ab56f64b60d0f0601d8e133275552bfd","abstract_canon_sha256":"828abaa7d1c09ba5573e156f683cfa47af88535b7c270c5357d8cce444fcbe3e"},"schema_version":"1.0"},"canonical_sha256":"4f4356dd7edc37cb95daf941cf4ba91deb057dbeeee769dd41d5d7397b74a7e3","source":{"kind":"arxiv","id":"1012.3156","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1012.3156","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"arxiv_version","alias_value":"1012.3156v1","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1012.3156","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"pith_short_12","alias_value":"J5BVNXL63Q34","created_at":"2026-05-18T12:26:09Z"},{"alias_kind":"pith_short_16","alias_value":"J5BVNXL63Q34XFO2","created_at":"2026-05-18T12:26:09Z"},{"alias_kind":"pith_short_8","alias_value":"J5BVNXL6","created_at":"2026-05-18T12:26:09Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:J5BVNXL63Q34XFO27FA46S5JDX","target":"record","payload":{"canonical_record":{"source":{"id":"1012.3156","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2010-12-14T20:24:21Z","cross_cats_sorted":["cs.CR","physics.soc-ph"],"title_canon_sha256":"a69a37122164b88f7549f2a47c7d1010ab56f64b60d0f0601d8e133275552bfd","abstract_canon_sha256":"828abaa7d1c09ba5573e156f683cfa47af88535b7c270c5357d8cce444fcbe3e"},"schema_version":"1.0"},"canonical_sha256":"4f4356dd7edc37cb95daf941cf4ba91deb057dbeeee769dd41d5d7397b74a7e3","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:33:18.479549Z","signature_b64":"5LDakE2scifRx1/HVtuTFKuF+BJVr3LuHn1aNjorh89rBccWo7klZWbBNOYBQXuChqdR1V7o6d7ann22rrSZBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"4f4356dd7edc37cb95daf941cf4ba91deb057dbeeee769dd41d5d7397b74a7e3","last_reissued_at":"2026-05-18T04:33:18.478932Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:33:18.478932Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1012.3156","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:33:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BgNtWjpyR/QWHTJeP1Yxs2pqsPh7JpwMOPmPr40+AucOCFTlcH+fkBWdyOn/bZTAM4Rpkmr5z1Tz8QFQSKNoBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T03:32:58.604295Z"},"content_sha256":"ebcf9ca3dcf06d7b1543facbd5101f6c2c4b525dc5c28681cdb4e55e8b406475","schema_version":"1.0","event_id":"sha256:ebcf9ca3dcf06d7b1543facbd5101f6c2c4b525dc5c28681cdb4e55e8b406475"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:J5BVNXL63Q34XFO27FA46S5JDX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"New generation of mobile phone viruses and corresponding countermeasures","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","physics.soc-ph"],"primary_cat":"cs.NI","authors_text":"Albert-L\\'aszl\\'o Barab\\'asi, Marta C. Gonz\\'alez, Pu Wang, Ronaldo Menezes","submitted_at":"2010-12-14T20:24:21Z","abstract_excerpt":"The fast growing market for smart phones coupled with their almost continuous online presence makes these devices the new targets of virus writers. It has been recently found that the topological spread of MMS (Multimedia Message Services) viruses is highly restricted by the underlying fragmentation of the call graph. In this paper, we study MMS viruses under another type of spreading behavior: scanning. We find that hybrid MMS viruses including some level of scanning are more dangerous to the mobile community than their standard topological counterparts. However, the effectiveness of both sca"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1012.3156","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:33:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OjmyRu4mhaT50ywR+iOP4dybgdd32+FgNm9XQALe1tqAV2xABDUAUElqGexTK8C2pZj5FP6nxyRl05OjbFsTAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T03:32:58.604985Z"},"content_sha256":"078509fbc2baaaca048575ba9c36c923ba221520afb793e92a365aec021b09fc","schema_version":"1.0","event_id":"sha256:078509fbc2baaaca048575ba9c36c923ba221520afb793e92a365aec021b09fc"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/J5BVNXL63Q34XFO27FA46S5JDX/bundle.json","state_url":"https://pith.science/pith/J5BVNXL63Q34XFO27FA46S5JDX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/J5BVNXL63Q34XFO27FA46S5JDX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T03:32:58Z","links":{"resolver":"https://pith.science/pith/J5BVNXL63Q34XFO27FA46S5JDX","bundle":"https://pith.science/pith/J5BVNXL63Q34XFO27FA46S5JDX/bundle.json","state":"https://pith.science/pith/J5BVNXL63Q34XFO27FA46S5JDX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/J5BVNXL63Q34XFO27FA46S5JDX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:J5BVNXL63Q34XFO27FA46S5JDX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"828abaa7d1c09ba5573e156f683cfa47af88535b7c270c5357d8cce444fcbe3e","cross_cats_sorted":["cs.CR","physics.soc-ph"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2010-12-14T20:24:21Z","title_canon_sha256":"a69a37122164b88f7549f2a47c7d1010ab56f64b60d0f0601d8e133275552bfd"},"schema_version":"1.0","source":{"id":"1012.3156","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1012.3156","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"arxiv_version","alias_value":"1012.3156v1","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1012.3156","created_at":"2026-05-18T04:33:18Z"},{"alias_kind":"pith_short_12","alias_value":"J5BVNXL63Q34","created_at":"2026-05-18T12:26:09Z"},{"alias_kind":"pith_short_16","alias_value":"J5BVNXL63Q34XFO2","created_at":"2026-05-18T12:26:09Z"},{"alias_kind":"pith_short_8","alias_value":"J5BVNXL6","created_at":"2026-05-18T12:26:09Z"}],"graph_snapshots":[{"event_id":"sha256:078509fbc2baaaca048575ba9c36c923ba221520afb793e92a365aec021b09fc","target":"graph","created_at":"2026-05-18T04:33:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The fast growing market for smart phones coupled with their almost continuous online presence makes these devices the new targets of virus writers. It has been recently found that the topological spread of MMS (Multimedia Message Services) viruses is highly restricted by the underlying fragmentation of the call graph. In this paper, we study MMS viruses under another type of spreading behavior: scanning. We find that hybrid MMS viruses including some level of scanning are more dangerous to the mobile community than their standard topological counterparts. However, the effectiveness of both sca","authors_text":"Albert-L\\'aszl\\'o Barab\\'asi, Marta C. Gonz\\'alez, Pu Wang, Ronaldo Menezes","cross_cats":["cs.CR","physics.soc-ph"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2010-12-14T20:24:21Z","title":"New generation of mobile phone viruses and corresponding countermeasures"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1012.3156","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ebcf9ca3dcf06d7b1543facbd5101f6c2c4b525dc5c28681cdb4e55e8b406475","target":"record","created_at":"2026-05-18T04:33:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"828abaa7d1c09ba5573e156f683cfa47af88535b7c270c5357d8cce444fcbe3e","cross_cats_sorted":["cs.CR","physics.soc-ph"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2010-12-14T20:24:21Z","title_canon_sha256":"a69a37122164b88f7549f2a47c7d1010ab56f64b60d0f0601d8e133275552bfd"},"schema_version":"1.0","source":{"id":"1012.3156","kind":"arxiv","version":1}},"canonical_sha256":"4f4356dd7edc37cb95daf941cf4ba91deb057dbeeee769dd41d5d7397b74a7e3","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"4f4356dd7edc37cb95daf941cf4ba91deb057dbeeee769dd41d5d7397b74a7e3","first_computed_at":"2026-05-18T04:33:18.478932Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:33:18.478932Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"5LDakE2scifRx1/HVtuTFKuF+BJVr3LuHn1aNjorh89rBccWo7klZWbBNOYBQXuChqdR1V7o6d7ann22rrSZBw==","signature_status":"signed_v1","signed_at":"2026-05-18T04:33:18.479549Z","signed_message":"canonical_sha256_bytes"},"source_id":"1012.3156","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ebcf9ca3dcf06d7b1543facbd5101f6c2c4b525dc5c28681cdb4e55e8b406475","sha256:078509fbc2baaaca048575ba9c36c923ba221520afb793e92a365aec021b09fc"],"state_sha256":"d64c055beccb9d98625679bbcc37a2757b9ffe554dee6ffde04350acea68cbf2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TQT65rZb+HNa1uKv1HZ8eJy7ksyZoZqxogCPMv7w8xvrlx7kLUjvMio3pTh9u08sxey4vs6vjavSaq4toc+SCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T03:32:58.608675Z","bundle_sha256":"cc91675be618069521dd5ab3b5cb83a73cd12ae5bc4bfbf7b72504e9e14777b3"}}