{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:PBXPOXDTVFE2QQWAGLRIBU33D4","short_pith_number":"pith:PBXPOXDT","canonical_record":{"source":{"id":"1705.10295","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","cross_cats_sorted":[],"title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd","abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9"},"schema_version":"1.0"},"canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","source":{"kind":"arxiv","id":"1705.10295","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"arxiv_version","alias_value":"1705.10295v2","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"pith_short_12","alias_value":"PBXPOXDTVFE2","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_16","alias_value":"PBXPOXDTVFE2QQWA","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_8","alias_value":"PBXPOXDT","created_at":"2026-05-18T12:31:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:PBXPOXDTVFE2QQWAGLRIBU33D4","target":"record","payload":{"canonical_record":{"source":{"id":"1705.10295","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","cross_cats_sorted":[],"title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd","abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9"},"schema_version":"1.0"},"canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:21:35.010214Z","signature_b64":"gCNapDF0Fr/HJziW/wmC7sMmPTbDjhYA+fJy5YNX9fgyw44A1r+TsFRatdP+vPzTQswSnl5SDPzD0jSp3garBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","last_reissued_at":"2026-05-18T00:21:35.009464Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:21:35.009464Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1705.10295","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:21:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7WnQ2/FXAM/rO3fHc3JRRf98qF59wd58+PUAGhMGAhz5EQOnfIROHQfdnjJsVDlhOlsumKlnlDJnPLMQT4RNCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T02:53:41.615159Z"},"content_sha256":"3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179","schema_version":"1.0","event_id":"sha256:3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:PBXPOXDTVFE2QQWAGLRIBU33D4","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Aaro Lehikoinen, Ahmad-Reza Sadeghi, Andrew Paverd, Ghada Dessouky, N. Asokan, Shaza Zeitouni, Thomas Nyman","submitted_at":"2017-05-29T17:29:06Z","abstract_excerpt":"Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the code at run-time, e.g., (fine-grained) randomization or Control Flow Integrity. However, recent work on data-oriented programming (DOP) demonstrated highly expressive (Turing-complete) attacks, even in the presence of these state-of-the-art defenses. Although multiple real-world DOP attacks have been demonstrated, no efficient defenses are yet"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.10295","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:21:35Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g5DUG2Htf698+vCKtRMLn7b7fKAuKEZZ7Pcc4Y9/abQ3dWUWV9JUw22afLJyQnBh8s6vNoJuc55YYvSbSMP1AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T02:53:41.615859Z"},"content_sha256":"59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41","schema_version":"1.0","event_id":"sha256:59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/bundle.json","state_url":"https://pith.science/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T02:53:41Z","links":{"resolver":"https://pith.science/pith/PBXPOXDTVFE2QQWAGLRIBU33D4","bundle":"https://pith.science/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/bundle.json","state":"https://pith.science/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PBXPOXDTVFE2QQWAGLRIBU33D4/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:PBXPOXDTVFE2QQWAGLRIBU33D4","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd"},"schema_version":"1.0","source":{"id":"1705.10295","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"arxiv_version","alias_value":"1705.10295v2","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"pith_short_12","alias_value":"PBXPOXDTVFE2","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_16","alias_value":"PBXPOXDTVFE2QQWA","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_8","alias_value":"PBXPOXDT","created_at":"2026-05-18T12:31:37Z"}],"graph_snapshots":[{"event_id":"sha256:59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41","target":"graph","created_at":"2026-05-18T00:21:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the code at run-time, e.g., (fine-grained) randomization or Control Flow Integrity. However, recent work on data-oriented programming (DOP) demonstrated highly expressive (Turing-complete) attacks, even in the presence of these state-of-the-art defenses. Although multiple real-world DOP attacks have been demonstrated, no efficient defenses are yet","authors_text":"Aaro Lehikoinen, Ahmad-Reza Sadeghi, Andrew Paverd, Ghada Dessouky, N. Asokan, Shaza Zeitouni, Thomas Nyman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title":"HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.10295","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179","target":"record","created_at":"2026-05-18T00:21:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd"},"schema_version":"1.0","source":{"id":"1705.10295","kind":"arxiv","version":2}},"canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","first_computed_at":"2026-05-18T00:21:35.009464Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:21:35.009464Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"gCNapDF0Fr/HJziW/wmC7sMmPTbDjhYA+fJy5YNX9fgyw44A1r+TsFRatdP+vPzTQswSnl5SDPzD0jSp3garBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:21:35.010214Z","signed_message":"canonical_sha256_bytes"},"source_id":"1705.10295","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179","sha256:59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41"],"state_sha256":"7470cc6936fcde8214ce239b308ec75706b3b521206530c7cf9b6c0fbc9c25ac"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/T6vJf47p2zFI6qojJwGgHdov/dcpslnVO4uo07wF5qB82izzx7P7HCTmP3OWv5qFRa7h96u/Px35ZRBEpeGBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T02:53:41.620038Z","bundle_sha256":"38d8e4bd09f70bea1688834ff3f46474cdad33ed6a4e593b57af1d6878320261"}}