{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2025:JHDHT2OXT7NW4XOEEDC75PLFLR","short_pith_number":"pith:JHDHT2OX","schema_version":"1.0","canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","source":{"kind":"arxiv","id":"2508.21457","version":3},"attestation_state":"computed","paper":{"title":"SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Carsten Rudolph, Fengchao Chen, Tingmin Wu, Van Nguyen","submitted_at":"2025-08-29T09:39:46Z","abstract_excerpt":"Phishing campaigns involve adversaries masquerading as trusted vendors trying to trigger user behavior that enables them to exfiltrate private data. While URLs are an important part of phishing campaigns, communicative elements like text and images are central in triggering the required user behavior. Further, due to advances in phishing detection, attackers react by scaling campaigns to larger numbers and diversifying and personalizing content. In addition to established mechanisms, such as template-based generation, large language models (LLMs) can be used for phishing content generation, en"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"2508.21457","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","cross_cats_sorted":[],"title_canon_sha256":"a6e92dd911a451c7ff7314bde60d76ecf2f9cd50aaeadc7b60f59e2f624aa66f","abstract_canon_sha256":"fc9b634498cacc0bb0fc0941c420385e8b64bc2eb36e5c74e5d69b790da5e202"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:09:34.800510Z","signature_b64":"0wjNcJ88jcFKLgYtWyjtOB0mHHQnwcm68lpCuBnehPiYxoUlKeGJXnI2Dz5DDq6UqygpHC4oB5153H627m3xCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","last_reissued_at":"2026-05-18T03:09:34.799926Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:09:34.799926Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Carsten Rudolph, Fengchao Chen, Tingmin Wu, Van Nguyen","submitted_at":"2025-08-29T09:39:46Z","abstract_excerpt":"Phishing campaigns involve adversaries masquerading as trusted vendors trying to trigger user behavior that enables them to exfiltrate private data. While URLs are an important part of phishing campaigns, communicative elements like text and images are central in triggering the required user behavior. Further, due to advances in phishing detection, attackers react by scaling campaigns to larger numbers and diversifying and personalizing content. In addition to established mechanisms, such as template-based generation, large language models (LLMs) can be used for phishing content generation, en"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2508.21457","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2508.21457","created_at":"2026-05-18T03:09:34.800032+00:00"},{"alias_kind":"arxiv_version","alias_value":"2508.21457v3","created_at":"2026-05-18T03:09:34.800032+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2508.21457","created_at":"2026-05-18T03:09:34.800032+00:00"},{"alias_kind":"pith_short_12","alias_value":"JHDHT2OXT7NW","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_16","alias_value":"JHDHT2OXT7NW4XOE","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_8","alias_value":"JHDHT2OX","created_at":"2026-05-18T12:33:37.589309+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR","json":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR.json","graph_json":"https://pith.science/api/pith-number/JHDHT2OXT7NW4XOEEDC75PLFLR/graph.json","events_json":"https://pith.science/api/pith-number/JHDHT2OXT7NW4XOEEDC75PLFLR/events.json","paper":"https://pith.science/paper/JHDHT2OX"},"agent_actions":{"view_html":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR","download_json":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR.json","view_paper":"https://pith.science/paper/JHDHT2OX","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2508.21457&json=true","fetch_graph":"https://pith.science/api/pith-number/JHDHT2OXT7NW4XOEEDC75PLFLR/graph.json","fetch_events":"https://pith.science/api/pith-number/JHDHT2OXT7NW4XOEEDC75PLFLR/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/action/timestamp_anchor","attest_storage":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/action/storage_attestation","attest_author":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/action/author_attestation","sign_citation":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/action/citation_signature","submit_replication":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/action/replication_record"}},"created_at":"2026-05-18T03:09:34.800032+00:00","updated_at":"2026-05-18T03:09:34.800032+00:00"}