{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","short_pith_number":"pith:PRNR4GCY","canonical_record":{"source":{"id":"2605.10867","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-11T17:17:02Z","cross_cats_sorted":["cs.AI","cs.CV","cs.LG","cs.NI"],"title_canon_sha256":"ec8bd3d776da47760665b4b21effa83e1cadcaf1e15be72ccd8fd6fc2bce91c7","abstract_canon_sha256":"e95139f76dbb57cbb7893e0fbc96be8d087ee571519213f824e5bd2138483c59"},"schema_version":"1.0"},"canonical_sha256":"7c5b1e185823ff07ee247068a7576bcb193fb52b9a9878b618e78494979f5df1","source":{"kind":"arxiv","id":"2605.10867","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.10867","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"arxiv_version","alias_value":"2605.10867v2","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.10867","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_12","alias_value":"PRNR4GCYEP7Q","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_16","alias_value":"PRNR4GCYEP7QP3RE","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_8","alias_value":"PRNR4GCY","created_at":"2026-05-20T00:01:43Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","target":"record","payload":{"canonical_record":{"source":{"id":"2605.10867","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-11T17:17:02Z","cross_cats_sorted":["cs.AI","cs.CV","cs.LG","cs.NI"],"title_canon_sha256":"ec8bd3d776da47760665b4b21effa83e1cadcaf1e15be72ccd8fd6fc2bce91c7","abstract_canon_sha256":"e95139f76dbb57cbb7893e0fbc96be8d087ee571519213f824e5bd2138483c59"},"schema_version":"1.0"},"canonical_sha256":"7c5b1e185823ff07ee247068a7576bcb193fb52b9a9878b618e78494979f5df1","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:01:43.798168Z","signature_b64":"kwcw+u6lqeDSve1o0ep2FPYhK3T2ANTPU152GVxqyKuTDusQLARruxbOD7C7Cu/LmhElg8zDunjSHoR9SOk6Cg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7c5b1e185823ff07ee247068a7576bcb193fb52b9a9878b618e78494979f5df1","last_reissued_at":"2026-05-20T00:01:43.797666Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:01:43.797666Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.10867","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"PyUiKRTJ0NX+PW5q0KczzzaRl1SWgvQHCBvIdAOHpeyjNPFTiZzj8reKnO0BKYfziSRQ68evN4thAQrFOI7aDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:17.864183Z"},"content_sha256":"4c26f8050b1a31531e7d7f5c482904df018e2f8b0d6928b958f3b95c1a16618a","schema_version":"1.0","event_id":"sha256:4c26f8050b1a31531e7d7f5c482904df018e2f8b0d6928b958f3b95c1a16618a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"BEACON: A Multimodal Dataset for Learning Behavioral Fingerprints from Gameplay Data","license":"http://creativecommons.org/licenses/by/4.0/","headline":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems.","cross_cats":["cs.AI","cs.CV","cs.LG","cs.NI"],"primary_cat":"cs.CR","authors_text":"Guramrit Singh, Gurjot Singh, Gursmeep Kaur, Ishpuneet Singh, Maninder Singh, Uday Pratap Singh Atwal","submitted_at":"2026-05-11T17:17:02Z","abstract_excerpt":"Continuous authentication in high-stakes digital environments requires datasets with fine-grained behavioral signals under realistic cognitive and motor demands. But current benchmarks are often limited by small scale, unimodal sensing or lack of synchronised environmental context. To address this gap, this paper introduces BEACON (Behavioral Engine for Authentication & Continuous Monitoring), a large-scale multimodal dataset that captures diverse skill tiers in competitive Valorant gameplay. BEACON contains approximately 430 GB of synchronised modality data (461 GB total on-disk including aux"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"BEACON contains approximately 430 GB of synchronised modality data from 79 sessions across 28 distinct players, estimated at 102.51 hours of active gameplay, including high-frequency mouse dynamics, keystroke events, network packet captures, screen recordings, hardware metadata, and in-game configuration context.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"The high precision motor skills and high cognitive load inherent to tactical shooters make the collected data a rigorous stress test for the robustness of behavioral biometrics.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"BEACON is a large-scale multimodal dataset of synchronized Valorant esports gameplay data for behavioral fingerprinting and continuous authentication research.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"26b688f11ec8221efb712cb4f77058553bcefea7379a4dca82bb7d04af283635"},"source":{"id":"2605.10867","kind":"arxiv","version":2},"verdict":{"id":"37071374-107e-4bb2-9a80-05538b5b9643","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-19T17:11:20.103897Z","strongest_claim":"BEACON contains approximately 430 GB of synchronised modality data from 79 sessions across 28 distinct players, estimated at 102.51 hours of active gameplay, including high-frequency mouse dynamics, keystroke events, network packet captures, screen recordings, hardware metadata, and in-game configuration context.","one_line_summary":"BEACON is a large-scale multimodal dataset of synchronized Valorant esports gameplay data for behavioral fingerprinting and continuous authentication research.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"The high precision motor skills and high cognitive load inherent to tactical shooters make the collected data a rigorous stress test for the robustness of behavioral biometrics.","pith_extraction_headline":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems."},"integrity":{"clean":false,"summary":{"advisory":2,"critical":0,"by_detector":{"doi_compliance":{"total":2,"advisory":2,"critical":0,"informational":0}},"informational":0},"endpoint":"/pith/2605.10867/integrity.json","findings":[{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detector":"doi_compliance","severity":"advisory","ref_index":1,"audited_at":"2026-05-19T08:56:18.304026Z","detected_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW","finding_type":"recoverable_identifier","verdict_class":"incontrovertible","detected_arxiv_id":null},{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICECET52533.2021.9698532.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detector":"doi_compliance","severity":"advisory","ref_index":28,"audited_at":"2026-05-19T08:56:18.304026Z","detected_doi":"10.1109/ICECET52533.2021.9698532.12","finding_type":"recoverable_identifier","verdict_class":"incontrovertible","detected_arxiv_id":null}],"available":true,"detectors_run":[{"name":"ai_meta_artifact","ran_at":"2026-05-19T14:34:07.136361Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_title_agreement","ran_at":"2026-05-19T10:31:17.443375Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_compliance","ran_at":"2026-05-19T08:56:18.304026Z","status":"completed","version":"1.0.0","findings_count":2}],"snapshot_sha256":"c46ffa0f9dacae4aff94565e38aed472abd3342b897415cb05bc83dca205265f"},"references":{"count":39,"sample":[{"doi":"10.35377/saucis","year":2026,"title":"Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20","work_id":"f59342be-1241-4234-af0b-400dda6ce99d","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1109/saci51354.2021.9465583","year":2021,"title":"Sapimouse: Mouse dynamics-based user authentication using deep feature learning","work_id":"52625f6d-322a-462a-ab00-696e317c3a81","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1145/3576915.3616639","year":2023,"title":"Realistic website fingerprinting by augmenting network traces","work_id":"3f41536b-4142-473e-81e0-250fdb8c1321","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2018,"title":"Var-cnn and dynaflow: Improved attacks and defenses for website fingerprinting.CoRR, abs/1802.10215","work_id":"a812ac0f-2575-4f81-abd9-28d3dccc00c2","ref_index":4,"cited_arxiv_id":"1802.10215","is_internal_anchor":true},{"doi":"10.1038/s41597-023-02510-7","year":2023,"title":"Sc2egset: Starcraft ii esport replay and game-state dataset.Scientific Data, 10(1):600, Sep 2023","work_id":"fbb5e832-b46f-4b52-89ae-a0debd68d5f2","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":39,"snapshot_sha256":"a5a6a58513c1f86832f0eed4d337c42197a100f09c2dff839670e1230605514d","internal_anchors":1},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"37071374-107e-4bb2-9a80-05538b5b9643"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mfW6wHDEhaDk0dVUNxfovjGQRMY3BfRDYfJQPj3vPMdpxsq5At1bksbUUOhWB0AfJ6VrrO6o1X78V5xJazHsAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:17.865542Z"},"content_sha256":"afa4cc8229d89b4b7a81e7f012e8153aff2a04f44dae8c676f887360724f6b02","schema_version":"1.0","event_id":"sha256:afa4cc8229d89b4b7a81e7f012e8153aff2a04f44dae8c676f887360724f6b02"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICECET52533.2021.9698532.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Nyle Siddiqui, Rushit Dave, and Naeem Seliya. Continuous user authentication using mouse dynamics, machine learning, and minecraft. In2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1–6, 2021. d","arxiv_id":"2605.10867","detector":"doi_compliance","evidence":{"ref_index":28,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Nyle Siddiqui, Rushit Dave, and Naeem Seliya. Continuous user authentication using mouse dynamics, machine learning, and minecraft. In2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), pages 1–6, 2021. d","reconstructed_doi":"10.1109/ICECET52533.2021.9698532.12"},"severity":"advisory","ref_index":28,"audited_at":"2026-05-19T08:56:18.304026Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICECET52533.2021.9698532.12","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7b3f2c4cb49c26005d63d58ac80eed9585884a9832cac252483f1e9f2d8f286e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":539,"payload_sha256":"da77f8ee5b25a55b0dc5b20ab0dd3de39b8a4b9ea5cfeb8233a4b8d0c319cea5","signature_b64":"2hJtEXMZr7qWEoDMced9hE+NxEpQpqTI9vEpzRg3EW4f+SDxW3saDoztCqb5jtjr7jSMrbvdXC6pLMPOOkYxCA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T08:56:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Z94B2OTG0iVpL9RM/bUCn9OVvz5isc66U/5yAgSQ6fcWpJeLEH98ewAdXU7ao0mXzvtaVP7hKKm4Y1dPZqLKAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:17.866678Z"},"content_sha256":"10445bf8a50a485c69ebf0473813bbaf7843d19673f5628b4c9fbdbc4ab5b2dd","schema_version":"1.0","event_id":"sha256:10445bf8a50a485c69ebf0473813bbaf7843d19673f5628b4c9fbdbc4ab5b2dd"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ahmed Abbas, Tareq Abed Mohammed, Zena Ez Dallalbash, and Adil Khalil. Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20, 2026. d","arxiv_id":"2605.10867","detector":"doi_compliance","evidence":{"ref_index":1,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ahmed Abbas, Tareq Abed Mohammed, Zena Ez Dallalbash, and Adil Khalil. Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20, 2026. d","reconstructed_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW"},"severity":"advisory","ref_index":1,"audited_at":"2026-05-19T08:56:18.304026Z","event_type":"pith.integrity.v1","detected_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"714e872ece47ac0325b4aecd798f3233e348812aebad464ce9b94664ab12b7bf","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":538,"payload_sha256":"0355df47d806088dc075308c7fdc74bf971bc136ba50a94f031033ee8a1e3a1f","signature_b64":"jr4DvWTz6wzyWLxau6Xi7o9KsRXlWhODebTmbe9TPeLWcyT2i6r2BPcmIsN0beuz7zTETk6YnCm8NEr2GAseCg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T08:56:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"72B7mDkqNQpN/vrc+yRe5n5kKH4/kkYr0n9oDDpuELDBVkHwiSQA8O7530mepGzYP46tMR2lAUHbkoMmFZBNAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:17.866979Z"},"content_sha256":"24dc9935b8e1589f854e02deeed546ea964fcd81eada64adb19fa40ca30c4b95","schema_version":"1.0","event_id":"sha256:24dc9935b8e1589f854e02deeed546ea964fcd81eada64adb19fa40ca30c4b95"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/bundle.json","state_url":"https://pith.science/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T10:26:17Z","links":{"resolver":"https://pith.science/pith/PRNR4GCYEP7QP3REOBUKOV3LZM","bundle":"https://pith.science/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/bundle.json","state":"https://pith.science/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PRNR4GCYEP7QP3REOBUKOV3LZM/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:PRNR4GCYEP7QP3REOBUKOV3LZM","merge_version":"pith-open-graph-merge-v1","event_count":4,"valid_event_count":4,"invalid_event_count":0,"equivocation_count":1,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e95139f76dbb57cbb7893e0fbc96be8d087ee571519213f824e5bd2138483c59","cross_cats_sorted":["cs.AI","cs.CV","cs.LG","cs.NI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-11T17:17:02Z","title_canon_sha256":"ec8bd3d776da47760665b4b21effa83e1cadcaf1e15be72ccd8fd6fc2bce91c7"},"schema_version":"1.0","source":{"id":"2605.10867","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.10867","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"arxiv_version","alias_value":"2605.10867v2","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.10867","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_12","alias_value":"PRNR4GCYEP7Q","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_16","alias_value":"PRNR4GCYEP7QP3RE","created_at":"2026-05-20T00:01:43Z"},{"alias_kind":"pith_short_8","alias_value":"PRNR4GCY","created_at":"2026-05-20T00:01:43Z"}],"graph_snapshots":[{"event_id":"sha256:afa4cc8229d89b4b7a81e7f012e8153aff2a04f44dae8c676f887360724f6b02","target":"graph","created_at":"2026-05-20T00:01:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"BEACON contains approximately 430 GB of synchronised modality data from 79 sessions across 28 distinct players, estimated at 102.51 hours of active gameplay, including high-frequency mouse dynamics, keystroke events, network packet captures, screen recordings, hardware metadata, and in-game configuration context."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"The high precision motor skills and high cognitive load inherent to tactical shooters make the collected data a rigorous stress test for the robustness of behavioral biometrics."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"BEACON is a large-scale multimodal dataset of synchronized Valorant esports gameplay data for behavioral fingerprinting and continuous authentication research."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems."}],"snapshot_sha256":"26b688f11ec8221efb712cb4f77058553bcefea7379a4dca82bb7d04af283635"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":false,"detectors_run":[{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T14:34:07.136361Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"doi_title_agreement","ran_at":"2026-05-19T10:31:17.443375Z","status":"completed","version":"1.0.0"},{"findings_count":2,"name":"doi_compliance","ran_at":"2026-05-19T08:56:18.304026Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.10867/integrity.json","findings":[{"audited_at":"2026-05-19T08:56:18.304026Z","detected_arxiv_id":null,"detected_doi":"10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW","detector":"doi_compliance","finding_type":"recoverable_identifier","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.35377/saucis...1729803.URLhttps://izlik.org/JA55RG93DW) was visible in the surrounding text but could not be confirmed against doi.org as printed.","ref_index":1,"severity":"advisory","verdict_class":"incontrovertible"},{"audited_at":"2026-05-19T08:56:18.304026Z","detected_arxiv_id":null,"detected_doi":"10.1109/ICECET52533.2021.9698532.12","detector":"doi_compliance","finding_type":"recoverable_identifier","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICECET52533.2021.9698532.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","ref_index":28,"severity":"advisory","verdict_class":"incontrovertible"}],"snapshot_sha256":"c46ffa0f9dacae4aff94565e38aed472abd3342b897415cb05bc83dca205265f","summary":{"advisory":2,"by_detector":{"doi_compliance":{"advisory":2,"critical":0,"informational":0,"total":2}},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Continuous authentication in high-stakes digital environments requires datasets with fine-grained behavioral signals under realistic cognitive and motor demands. But current benchmarks are often limited by small scale, unimodal sensing or lack of synchronised environmental context. To address this gap, this paper introduces BEACON (Behavioral Engine for Authentication & Continuous Monitoring), a large-scale multimodal dataset that captures diverse skill tiers in competitive Valorant gameplay. BEACON contains approximately 430 GB of synchronised modality data (461 GB total on-disk including aux","authors_text":"Guramrit Singh, Gurjot Singh, Gursmeep Kaur, Ishpuneet Singh, Maninder Singh, Uday Pratap Singh Atwal","cross_cats":["cs.AI","cs.CV","cs.LG","cs.NI"],"headline":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-11T17:17:02Z","title":"BEACON: A Multimodal Dataset for Learning Behavioral Fingerprints from Gameplay Data"},"references":{"count":39,"internal_anchors":1,"resolved_work":39,"sample":[{"cited_arxiv_id":"","doi":"10.35377/saucis","is_internal_anchor":false,"ref_index":1,"title":"Integrating big data analytics and behavioral biometrics for advanced fraud detection.Sakarya University Journal of Computer and Information Sciences, 9(1):8–20","work_id":"f59342be-1241-4234-af0b-400dda6ce99d","year":2026},{"cited_arxiv_id":"","doi":"10.1109/saci51354.2021.9465583","is_internal_anchor":false,"ref_index":2,"title":"Sapimouse: Mouse dynamics-based user authentication using deep feature learning","work_id":"52625f6d-322a-462a-ab00-696e317c3a81","year":2021},{"cited_arxiv_id":"","doi":"10.1145/3576915.3616639","is_internal_anchor":false,"ref_index":3,"title":"Realistic website fingerprinting by augmenting network traces","work_id":"3f41536b-4142-473e-81e0-250fdb8c1321","year":2023},{"cited_arxiv_id":"1802.10215","doi":"","is_internal_anchor":true,"ref_index":4,"title":"Var-cnn and dynaflow: Improved attacks and defenses for website fingerprinting.CoRR, abs/1802.10215","work_id":"a812ac0f-2575-4f81-abd9-28d3dccc00c2","year":2018},{"cited_arxiv_id":"","doi":"10.1038/s41597-023-02510-7","is_internal_anchor":false,"ref_index":5,"title":"Sc2egset: Starcraft ii esport replay and game-state dataset.Scientific Data, 10(1):600, Sep 2023","work_id":"fbb5e832-b46f-4b52-89ae-a0debd68d5f2","year":2023}],"snapshot_sha256":"a5a6a58513c1f86832f0eed4d337c42197a100f09c2dff839670e1230605514d"},"source":{"id":"2605.10867","kind":"arxiv","version":2},"verdict":{"created_at":"2026-05-19T17:11:20.103897Z","id":"37071374-107e-4bb2-9a80-05538b5b9643","model_set":{"reader":"grok-4.3"},"one_line_summary":"BEACON is a large-scale multimodal dataset of synchronized Valorant esports gameplay data for behavioral fingerprinting and continuous authentication research.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"A new multimodal dataset from competitive gameplay provides synchronized behavioral signals for testing continuous authentication systems.","strongest_claim":"BEACON contains approximately 430 GB of synchronised modality data from 79 sessions across 28 distinct players, estimated at 102.51 hours of active gameplay, including high-frequency mouse dynamics, keystroke events, network packet captures, screen recordings, hardware metadata, and in-game configuration context.","weakest_assumption":"The high precision motor skills and high cognitive load inherent to tactical shooters make the collected data a rigorous stress test for the robustness of behavioral biometrics."}},"verdict_id":"37071374-107e-4bb2-9a80-05538b5b9643"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4c26f8050b1a31531e7d7f5c482904df018e2f8b0d6928b958f3b95c1a16618a","target":"record","created_at":"2026-05-20T00:01:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e95139f76dbb57cbb7893e0fbc96be8d087ee571519213f824e5bd2138483c59","cross_cats_sorted":["cs.AI","cs.CV","cs.LG","cs.NI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-11T17:17:02Z","title_canon_sha256":"ec8bd3d776da47760665b4b21effa83e1cadcaf1e15be72ccd8fd6fc2bce91c7"},"schema_version":"1.0","source":{"id":"2605.10867","kind":"arxiv","version":2}},"canonical_sha256":"7c5b1e185823ff07ee247068a7576bcb193fb52b9a9878b618e78494979f5df1","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"7c5b1e185823ff07ee247068a7576bcb193fb52b9a9878b618e78494979f5df1","first_computed_at":"2026-05-20T00:01:43.797666Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:01:43.797666Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"kwcw+u6lqeDSve1o0ep2FPYhK3T2ANTPU152GVxqyKuTDusQLARruxbOD7C7Cu/LmhElg8zDunjSHoR9SOk6Cg==","signature_status":"signed_v1","signed_at":"2026-05-20T00:01:43.798168Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.10867","source_kind":"arxiv","source_version":2}}},"equivocations":[{"signer_id":"pith.science","event_type":"integrity_finding","target":"integrity","event_ids":["sha256:10445bf8a50a485c69ebf0473813bbaf7843d19673f5628b4c9fbdbc4ab5b2dd","sha256:24dc9935b8e1589f854e02deeed546ea964fcd81eada64adb19fa40ca30c4b95"]}],"invalid_events":[],"applied_event_ids":["sha256:4c26f8050b1a31531e7d7f5c482904df018e2f8b0d6928b958f3b95c1a16618a","sha256:afa4cc8229d89b4b7a81e7f012e8153aff2a04f44dae8c676f887360724f6b02"],"state_sha256":"23387ff21234183d562c1aa8ab14c027d7defe350b263b6afce2024fb2787f4a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6AapAD4T0d9tJ1IOuIMpctxvfCbq0OtpHPG4K3byGC6Ivu3nozaW86AaAeQCESUp31VYDg2ACLPoR0nM0Mo4DQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T10:26:17.870439Z","bundle_sha256":"e77f478c3f7f3ee9d02496e794c68fa3ef52d0708b64166e4534a8e6a7026b14"}}