{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:PBXPOXDTVFE2QQWAGLRIBU33D4","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd"},"schema_version":"1.0","source":{"id":"1705.10295","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"arxiv_version","alias_value":"1705.10295v2","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1705.10295","created_at":"2026-05-18T00:21:35Z"},{"alias_kind":"pith_short_12","alias_value":"PBXPOXDTVFE2","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_16","alias_value":"PBXPOXDTVFE2QQWA","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_8","alias_value":"PBXPOXDT","created_at":"2026-05-18T12:31:37Z"}],"graph_snapshots":[{"event_id":"sha256:59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41","target":"graph","created_at":"2026-05-18T00:21:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the code at run-time, e.g., (fine-grained) randomization or Control Flow Integrity. However, recent work on data-oriented programming (DOP) demonstrated highly expressive (Turing-complete) attacks, even in the presence of these state-of-the-art defenses. Although multiple real-world DOP attacks have been demonstrated, no efficient defenses are yet","authors_text":"Aaro Lehikoinen, Ahmad-Reza Sadeghi, Andrew Paverd, Ghada Dessouky, N. Asokan, Shaza Zeitouni, Thomas Nyman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title":"HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1705.10295","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179","target":"record","created_at":"2026-05-18T00:21:35Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0823e1674a38298dceda069bb3d556c82812253ed9baa95e442de69f3d7653f9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-05-29T17:29:06Z","title_canon_sha256":"7c28fdae1763e948f9f5af612fbf77f2595c0a18d2a17aa2008f51e275b5adbd"},"schema_version":"1.0","source":{"id":"1705.10295","kind":"arxiv","version":2}},"canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"786ef75c73a949a842c032e280d37b1f36dd48fb33dcc94e1c04b9ca1d678b26","first_computed_at":"2026-05-18T00:21:35.009464Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:21:35.009464Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"gCNapDF0Fr/HJziW/wmC7sMmPTbDjhYA+fJy5YNX9fgyw44A1r+TsFRatdP+vPzTQswSnl5SDPzD0jSp3garBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:21:35.010214Z","signed_message":"canonical_sha256_bytes"},"source_id":"1705.10295","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:3028ce96b5b0803564a8feca7105067f7836ce31639b715e6347710dcdd3a179","sha256:59ea124cca62e569f90ea09e6c1268a9d2ed39c8217af44fc5f6075d0a963f41"],"state_sha256":"7470cc6936fcde8214ce239b308ec75706b3b521206530c7cf9b6c0fbc9c25ac"}